Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55182 vulnerability in React and Next.js | Kaspersky official blog

0
Medium
Vulnerability
Published: Thu Dec 04 2025 (12/04/2025, 19:12:46 UTC)
Source: Kaspersky Security Blog

Description

CVE-2025-55182, dubbed React4Shell, is a critical remote code execution vulnerability affecting React Server Components (RSC) and related frameworks such as Next. js. It allows unauthenticated attackers to send specially crafted HTTP requests that trigger unsafe deserialization in the Flight protocol, leading to arbitrary code execution on the server. The vulnerability impacts multiple React server-dom packages and several Next. js versions widely used in modern web applications. Exploitation requires no authentication or user interaction and can result in complete server takeover. Although no confirmed in-the-wild exploitation has been reported, proof-of-concept exploits exist, and the vulnerability affects approximately 39% of cloud infrastructures hosting React-based sites. Major cloud providers have deployed WAF rules to mitigate attacks, but patching remains essential. European organizations using vulnerable React or Next. js versions must urgently update, apply WAF protections, restrict server access, and monitor for suspicious activity to prevent potential large-scale attacks.

AI-Powered Analysis

AILast updated: 01/03/2026, 00:22:15 UTC

Technical Analysis

CVE-2025-55182, known as React4Shell, is a severe vulnerability discovered in React Server Components (RSC) and several derivative frameworks including Next.js, React Router RSC preview, Redwood SDK, Waku, and RSC plugins such as Vite and Parcel. The flaw resides in the unsafe deserialization of data streams within the Flight protocol, a lightweight HTTP-based streaming protocol used to transfer serialized component data between client and server. Vulnerable versions include React Server Components 19.0.0 through 19.2.0 and Next.js versions 15.0.4 through 16.0.6. An attacker can exploit this vulnerability by sending a crafted HTTP request that triggers execution of arbitrary code on the server with React privileges, without requiring authentication or user interaction. This can lead to complete server takeover, enabling attackers to access sensitive data, deploy web shells, or pivot within the network. The vulnerability is widespread, affecting tens of millions of websites, including high-profile services like Airbnb and Netflix, and is present in about 39% of cloud infrastructures running React-based applications. While no confirmed exploitation in the wild has been reported, proof-of-concept exploits with near 100% reliability are publicly available, increasing the risk of imminent mass exploitation. Cloud providers such as Akamai, AWS, Cloudflare, Google Cloud, and Vercel have issued WAF rules to mitigate attacks, but these are temporary measures. Comprehensive mitigation requires updating to patched versions of React Server Components and Next.js, restricting access to RSC endpoints, enhancing IP reputation filtering, rate limiting, and deploying endpoint detection and response (EDR) solutions to detect anomalous behavior post-exploitation. Organizations should also conduct thorough log analysis to identify suspicious requests and signs of post-exploitation activity such as secret reconnaissance and web shell installation. The vulnerability underscores the risks introduced by the relatively new server-side React components and the need for secure deserialization practices.

Potential Impact

For European organizations, the impact of CVE-2025-55182 is potentially severe due to the widespread adoption of React and Next.js in web applications across industries including finance, e-commerce, media, and government services. Successful exploitation can lead to complete server compromise, resulting in data breaches, theft of sensitive information such as credentials and secrets, service disruption, and potential lateral movement within corporate networks. Given that many cloud-hosted services in Europe run vulnerable React components, the risk extends to cloud infrastructure and hybrid environments. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of automated mass attacks, which could disrupt critical online services and damage organizational reputation. Additionally, compromised servers could be used as footholds for further attacks targeting European supply chains or critical infrastructure. The presence of proof-of-concept exploits and partial WAF mitigations means organizations delaying patching face heightened exposure. The impact is amplified in sectors with stringent data protection regulations like GDPR, where breaches can result in significant fines and legal consequences.

Mitigation Recommendations

European organizations should immediately update all React Server Components packages to versions 19.0.1, 19.1.2, or 19.2.1 and Next.js to versions 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, or 16.0.7 to remediate the vulnerability. They must inventory all applications using React RSC and Next.js to identify vulnerable instances, including indirect dependencies in derivative frameworks. Deploy and verify activation of WAF rules from cloud providers or third-party vendors to provide immediate protection, but do not rely solely on these. Restrict access to RSC endpoints by implementing strict IP whitelisting, reputation-based filtering, and rate limiting, especially for internal services. Enhance monitoring by deploying EDR/EPP solutions on servers hosting RSC components to detect anomalous process execution and post-exploitation behaviors such as secret reconnaissance and web shell deployment. Conduct thorough log analysis for suspicious HTTP requests indicative of exploitation attempts. Rotate all secrets, API keys, and credentials stored or accessible on affected servers as a precautionary measure. Educate development teams on secure deserialization practices and review application architectures to minimize exposure of server-side components. Finally, establish incident response plans tailored to this vulnerability to enable rapid containment and remediation if exploitation is detected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/react4shell-vulnerability-cve-2025-55182/54915/","fetched":true,"fetchedAt":"2025-12-04T19:13:39.333Z","wordCount":1428}

Threat ID: 6931dd90e9ea82452666b3c9

Added to database: 12/4/2025, 7:14:24 PM

Last enriched: 1/3/2026, 12:22:15 AM

Last updated: 1/18/2026, 5:32:27 PM

Views: 252

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats