React2Shell: Deep Dive Into CVE-2025-55182
The Wiz blog analyzes a critical vulnerability in React Server Components called React2Shell (CVE-2025-55182) that allows unauthenticated remote code execution (RCE) by exploiting insecure deserialization of incoming payloads, and while early reports focused on Next.js because it exposes this feature by default, the issue affects any framework using the vulnerable RSC logic. Wiz’s research shows active exploitation in the wild where attackers chain the bug to drop cryptominers, harvest cloud and developer credentials, gain interactive shells in containerized workloads, and install persistent backdoors. They explain how the exploit works at a technical level with crafted “gadget” payloads that trigger arbitrary server-side execution, note that other ecosystems like Vite and Waku with RSC support are also at risk, and emphasize that defenders must patch to fixed releases and use detection tools to find and mitigate compromised instances.
https://www.wiz.io/blog/nextjs-cve-2025-55182-react2shell-deep-dive
Comments
Post a Comment