A critical vulnerability in React Server Components dubbed React2Shell (CVE-2025-55182) lets attackers run code remotely without logging in. Here’s what developers need to know and how to fix it.

The React ecosystem is everywhere — from simple apps to massive enterprise platforms. But on December 3, 2025, developers were hit with a security shock: a critical remote code execution (RCE) vulnerability in React Server Components (RSC) was publicly disclosed, and it’s already being actively exploited. Unit 42+1
This flaw, tracked as CVE-2025-55182 and nicknamed React2Shell, has a CVSS score of 10, meaning it’s as severe as it gets: unauthenticated attackers can run arbitrary code on your server — potentially taking control of your entire application environment. React
React2Shell is a vulnerability in how React Server Components deserialize incoming data (known as the Flight protocol). When this process doesn’t validate payloads safely, attackers can send specially crafted requests that trick the server into executing malicious JavaScript. cert.europa.eu
In short: your server could run bad code without anyone logging in. Blog Detectify
This vulnerability exists in these React Server Components versions:
Apps built with frameworks that embed these libraries — especially Next.js (App Router) — are also exposed. react2shell.info
Even if your project doesn’t explicitly use “server functions,” it can still be vulnerable if the default RSC infrastructure is present. Windows Forum
This is not just a bug — it’s a full remote code execution flaw. That means:
Some cybersecurity teams even observed opportunistic exploitation attempts coming from wide-ranging automated scans. GreyNoise
Because React Server Components are widespread, this vulnerability doesn’t just threaten hobby apps — it can affect businesses on:
Security experts warn that even hosting providers and well-known frameworks are targets, and the exploit is being weaponized in the wild. Amazon Web Services, Inc.
Update all affected React Server Components packages to the fixed releases:
Then update frameworks and bundlers that embed these libraries (Next.js, RSC plugins, etc.) to patched versions. cert.europa.eu
If you cannot patch immediately, tighten access controls:
A WAF with rules tuned for this RCE can mitigate attacks while patches are deployed.
Scan:
Even boilerplate code can pull in vulnerable packages indirectly. cirt.gov.bd
Look for:
Add logging and alerting to catch exploitation early.
Not necessarily.
Even if you think you are only using client-side React, React Server Components may still be enabled by default through frameworks like Next.js. That means the vulnerability can still lurk in your dependencies. react2shell.info
React2Shell (CVE-2025-55182) is one of the most dangerous JavaScript ecosystem vulnerabilities in recent memory. It combines:
- pre-authentication RCE
- default-enabled attack surface
- broad framework impact
-active exploitation in the wild
The best defence is immediate patching, proper access controls, and vigilant monitoring.
If you run React Server Components or apps built upon them .This is not a “nice to know” issue… it’s a must-fix now security emergency.
Adeen writes about modern web development, security, and best practices for developers in rapidly evolving tech ecosystems.