TL;DR:
A critical flaw in React’s Flight protocol (CVE-2025-55182) allows attackers to run code on servers using React Server Components. In short, if your organization uses React Server Components, Next.js, or related frameworks, attackers could potentially take control of your servers, making this a top priority for immediate action.
What’s at risk?
- Vulnerable: React Server Components, Next.js, React Router, Waku, and several related frameworks.
- Impacted: Any organization running affected versions in production.
- Exploits: Proof-of-concept code is publicly available and active scanning is underway.
- Remediation: Upgrade to patched versions now to prevent remote code execution.
Real-world scenario:
Imagine a production server running an unpatched version of Next.js. An attacker sends a crafted payload, triggering remote code execution, and gaining unauthorized access to your infrastructure. The window between disclosure and exploitation is shrinking—don’t wait to act.
Immediate steps:
- Audit your environment for affected frameworks (e.g. leveraging Dynatrace Runtime Vulnerability Analytics).
- Upgrade dependencies to patched versions.
- Use Dynatrace Runtime Vulnerability Analytics to verify remediation.
- Monitor continuously for new threats.
What is React2Shell (CVE-2025-55182)?
A critical vulnerability called React2Shell has been discovered in React’s Flight protocol that could allow attackers to execute arbitrary code on servers running React Server Components. CVE-2025-55182 affects multiple popular frameworks including Next.js, React Router, and Waku, with exploitation possible under default configurations. While no verified public exploits exist yet, the severity and widespread nature of this vulnerability make immediate patching essential. Organizations using React Server Components should prioritize upgrading to patched versions to protect their applications from potential remote code execution attacks.
Technical details of the React2Shell vulnerability
CVE-2025-55182 is an unsafe deserialization vulnerability in React’s Flight protocol, affecting server component payloads. This flaw allows attackers to craft malicious payloads that, when processed by the server, can lead to unauthenticated remote code execution. Exploitation is possible under the default configuration of several popular frameworks, making the vulnerability critical and widely exploitable.
Which React and Next.js versions are vulnerable?
The following packages are vulnerable to CVE-2025-55182 because they implement parts of React’s Flight protocol, which handles server component payloads and is the source of the unsafe deserialization flaw:
| Package | Affected Versions |
| react-server-dom-parcel (npm) | 19.0, 19.1.0, 19.1.1, 19.2.0 |
| react-server-dom-turbopack (npm) | 19.0, 19.1.0, 19.1.1, 19.2.0 |
| react-server-dom-webpack (npm) | 19.0, 19.1.0, 19.1.1, 19.2.0 |
Frameworks that implement React Server Components and rely on these packages are also affected. These include: Next.js, React Router, Waku, @parcel/rsc, @vitejs/plugin-rsc, and rwsdk.
The react and react-dom libraries are not impacted because they do not include the Flight protocol or any server-side component handling. Environments that render React exclusively on the client, or that do not integrate frameworks, bundlers, or plugins supporting React Server Components, remain outside the scope of this vulnerability.
Related CVE-2025-66478 and Next.js
A related vulnerability, CVE-2025-66478, was initially published for Next.js and marked as critical. It was later rejected and classified as a duplicate of CVE-2025-55182, because the root cause lies in Next.js depending on vulnerable React packages that implement the Flight protocol.
While the dependency link is correct, Next.js does not rely on the npm ecosystem to resolve these React Server Component packages. Instead, Next.js includes compiled versions of the react-server-dom-* packages directly in its repository. This means that upgrading React in isolation will not remediate the vulnerability for Next.js users because the vulnerable code is embedded within Next.js itself.
The following Next.js (npm) versions are affected:
- 14.3.0-canary.77 and later canary releases
- 15.x series (prior to 15.5.7)
- 16.x series (prior to 16.0.7)
Next.js versions 13.x, 14.x stable, Pages Router applications, and the Edge Runtime are not affected by this vulnerability.
Are there working exploits for React2Shell?
Proof-of-concept exploits for React2Shell (CVE-2025-55182) have been developed and made publicly available. The vulnerability is reported to be actively scanned in the wild. This significantly elevates the risk for organizations running vulnerable versions of affected packages. Given the critical nature of React2Shell and the existence of a working exploit, immediate remediation is strongly advised.
Detecting React2Shell (CVE-2025-55182) with Runtime Vulnerability Analytics
You can use Dynatrace Runtime Vulnerability Analytics to detect if vulnerable React Server Component packages or Next.js packages are present and actively used in your environment. This helps confirm exposure and prioritize remediation efforts effectively.

Bottom Line: If you’re running React Server Components or Next.js in production, review your dependencies immediately and upgrade to patched versions.
How to fix CVE-2025-55182: patching guide
To address this vulnerability, it is recommended to upgrade to the patched versions of the affected packages.
Upgrade react-server-dom-* packages to one of the following versions:
- 19.0.1
- 19.1.2
- 19.2.1
Upgrade Next.js to one of the following versions:
- 15.0.5
- 15.1.9
- 15.2.6
- 15.3.6
- 15.4.8
- 15.5.7
- 16.0.7
Take action now
CVE-2025-55182 poses a critical threat to organizations using React Server Components in production, as public exploits are already available and actively being used.
Here’s what you should do immediately:
- Audit your environment. Identify all applications using React Server Components, Next.js, or related frameworks.
- Upgrade dependencies. Apply the patched versions listed in the mitigation section above.
- Verify remediation. Use Dynatrace Runtime Vulnerability Analytics or similar tools to confirm vulnerable packages have been eliminated.
- Monitor continuously. Implement ongoing vulnerability scanning to catch issues before they become incidents.
The combination of critical severity, default exploitability, and widespread framework adoption makes this vulnerability a top priority for security and development teams. Take action today to protect your applications and infrastructure.
Learn more about Dynatrace Runtime Vulnerability Analytics and how it can help you identify and prioritize vulnerabilities across your entire application portfolio.
Looking for answers?
Start a new discussion or ask for help in our Q&A forum.
Go to forum