{"id":6974,"date":"2025-12-05T10:23:57","date_gmt":"2025-12-05T10:23:57","guid":{"rendered":"https:\/\/locaterisk.com\/?p=6974"},"modified":"2026-02-12T14:46:59","modified_gmt":"2026-02-12T14:46:59","slug":"react2shell-cve-2025-55182","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/react2shell-cve-2025-55182\/","title":{"rendered":"\u201eReact2Shell\u201c: Critical vulnerability in React &amp; Next.js (CVE-2025-55182 \/ CVE-2025-66478)"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\n<div class=\"content\">\n<div class=\"main-content\">\n<h1 class=\"title\">\u201eReact2Shell\u201c: Critical vulnerability in React &amp; Next.js (CVE-2025-55182 \/ CVE-2025-66478)<\/h1>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p class=\"translation-block\">On December 3, 2025, a critical vulnerability was identified in the React Server Components and the subsequent Next.js Framework. The vulnerability in question has the potential to allow Remote Code Execution (RCE), which could result in the execution of arbitrary code on affected servers. It is estimated that this issue could affect thousands of web applications worldwide. This vulnerability is particularly dangerous as it can be exploited remotely and without authentication.<\/p>\n\n\n\n<p>Approximately <b>40% of all cloud environments<\/b> could <strong>be <\/strong>affected.<\/p>\n\n\n\n<p>Today, just two days later, there was a massive <b>global outage at Cloudflare<\/b>. Services like <b>LinkedIn, Zoom, Anthropic<\/b> and many others were temporarily unavailable. The reason: Cloudflare had deactivated internal logging functions in order to respond to the React security vulnerability. This led to a domino effect within their infrastructure.<\/p>\n\n\n\n<p>The vulnerability has been nicknamed \u201eReact2Shell\u201c by security researchers and platforms such as <a href=\"https:\/\/www.wiz.io\/blog\/critical-vulnerability-in-react-cve-2025-55182\" target=\"_blank\" rel=\"noopener\">Wiz.io<\/a> the nickname <strong>\u201eReact2Shell\u201c<\/strong>. The CVSS score is 10.0, which indicates the highest possible criticality.<\/p>\n\n\n<p><center><\/p>\n\n<figure style=\"width:700px;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1282\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/12\/code-1839406_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"object-fit:cover;\" \/><\/figure>\n\n<p><\/center><\/p>\n\n\n<h2 class=\"wp-block-heading\">What happened?<\/h2>\n\n\n\n<p><b>React Server Components (RSC)<\/b> enable server-side rendering of React components. An internal transfer protocol called \u201eFlight\u201c is used for this. Security researchers discovered that attackers can trigger insecure deserialization processes via manipulated payloads. <strong>The result: any code can be executed on the target server.<\/strong><\/p>\n\n\n\n<p>The following React packages are particularly affected:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>react-server-dom-webpack<\/li>\n\n\n\n<li>react-server-dom-vite<\/li>\n\n\n\n<li>react-server-dom-turbopack<\/li>\n<\/ul>\n\n\n\n<p>Especially versions 19.0.0, 19.1.0, 19.1.1 and 19.2.0 of these packages are affected. The official CVE ID for React is <a href=\"https:\/\/react.dev\/blog\/2025\/12\/03\/critical-security-vulnerability-in-react-server-components\" target=\"_blank\" rel=\"noopener\">CVE-2025-55182<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How is Next.js affected?<\/h2>\n\n\n\n<p>Since the popular web framework <strong>Next.js<\/strong> version 13 onwards relies on React Server Components (RSC) by default, many Next.js applications are also vulnerable. The Next.js vulnerability has been published separately as <a href=\"https:\/\/nextjs.org\/blog\/CVE-2025-66478\" target=\"_blank\" rel=\"noopener\">CVE-2025-66478.<\/a> conducted.<\/p>\n\n\n\n<p>In particular, all versions with activated <em>App Router<\/em>, especially from the major versions 15.x and 16.x. Experimental \u201eCanary\u201c releases are also affected.<\/p>\n\n\n\n<p>The Next.js maintainers explicitly warn against relying on configuration settings, as there is <strong>no switch to deactivate<\/strong> of the dangerous behavior. An update is inevitable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What consequences can the gap have?<\/h2>\n\n\n\n<p>The vulnerability allows attackers to execute arbitrary code on the server - without authentication. This can trigger the following scenarios:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Complete takeover of the affected servers<\/li>\n\n\n\n<li>Exfiltration of sensitive data<\/li>\n\n\n\n<li>Placing malware or backdoors<\/li>\n\n\n\n<li>Lateral movements in the network<\/li>\n\n\n\n<li>Reputational and compliance damage<\/li>\n<\/ul>\n\n\n\n<p>This is particularly critical for publicly accessible SaaS platforms, web portals, API gateways and customer front-ends.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Which products &amp; frameworks are affected?<\/h2>\n\n\n\n<p>In addition to React and Next.js, other frameworks and toolchains may also be affected if they use React Server Components. These include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vite<\/li>\n\n\n\n<li>Parcel<\/li>\n\n\n\n<li>RedwoodJS<\/li>\n\n\n\n<li>React router<\/li>\n\n\n\n<li>Remix (depending on setup)<\/li>\n<\/ul>\n\n\n\n<p>If your systems are affected largely depends on whether React RSC functionalities or frameworks based on them are used in production.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What measures can you take?<\/h2>\n\n\n\n<p>The React and Next.js teams have already published <strong>Security updates:<\/strong> published:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>React: <strong>19.0.1<\/strong>, <strong>19.1.2<\/strong>, <strong>19.2.1<\/strong><\/li>\n\n\n\n<li>Next.js: <strong>15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 15.6.0-canary.58, 16.0.7<\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Recommended measures:<\/strong><\/p>\n\n\n\n<p style=\"padding: 20px 0 5px\"><b>1. Carry out an inventory of your web applications<\/b><\/p>\n\n\n\n<p style=\"padding: 6px 0\"><b>2. Identify affected React and Next.js versions<\/b><\/p>\n\n\n\n<p style=\"padding: 6px 0\"><b>3. Update to the patched versions<\/b><\/p>\n\n\n\n<p style=\"padding: 6px 0\"><b>4. Check server logs for suspicious activity (e.g. unusual POST payloads)<\/b><\/p>\n\n\n\n<p style=\"padding: 6px 0 20px\"><b>5. Add additional protection mechanisms: e.g. web application firewalls (WAF), IDS\/IPS<\/b><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How LocateRisk can support you<\/h2>\n\n\n\n<p>With the <strong>External Attack Surface Management<\/strong> from <a href=\"https:\/\/locaterisk.com\/en\/\" target=\"_blank\" rel=\"noopener\">LocateRisk<\/a> companies automatically detect whether publicly accessible systems are affected by known vulnerabilities, such as <strong>CVE-2025-55182.<\/strong>&nbsp;are affected.<\/p>\n\n\n\n<p>The platform scans your external attack surface and informs you about new CVEs, potential attack vectors and configuration errors. Essential response time to critical vulnerabilities such as React2Shell can thus be drastically reduced.<\/p>\n\n\n\n<p>Thanks to integrated prioritization, risk assessment and automated reports, IT teams and management always have an overview. Even in exceptional situations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sources &amp; further links<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/react.dev\/blog\/2025\/12\/03\/critical-security-vulnerability-in-react-server-components\" target=\"_blank\" rel=\"noopener\">Official React message (react.dev)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/nextjs.org\/blog\/CVE-2025-66478\" target=\"_blank\" rel=\"noopener\">Official Next.js release (nextjs.org)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wiz.io\/blog\/critical-vulnerability-in-react-cve-2025-55182\" target=\"_blank\" rel=\"noopener\">Wiz.io blog post<\/a><\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"react2shell-cve-2025-55182\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>I agree to the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_blank\" rel=\"noreferrer noopener\">privacy policy.<\/a> read<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Schedule a Live Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React &amp; Next.js (CVE-2025-55182 \/ CVE-2025-66478) Am 3. Dezember 2025 wurde eine kritische Schwachstelle in den React Server Components und dem darauf aufbauenden Next.js Framework ver\u00f6ffentlicht. Die Sicherheitsl\u00fccke erm\u00f6glicht eine Remote Code Execution (RCE), also das Ausf\u00fchren beliebigen Codes auf betroffenen Servern, und betrifft potenziell tausende Webanwendungen weltweit. Besonders gef\u00e4hrlich: Die [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":7007,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React &amp; Next.js (CVE-2025-55182 \/ CVE-2025-66478) | LocateRisk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/react2shell-cve-2025-55182\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React &amp; Next.js (CVE-2025-55182 \/ CVE-2025-66478) | LocateRisk\" \/>\n<meta property=\"og:description\" content=\"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React &amp; Next.js (CVE-2025-55182 \/ CVE-2025-66478) Am 3. Dezember 2025 wurde eine kritische Schwachstelle in den React Server Components und dem darauf aufbauenden Next.js Framework ver\u00f6ffentlicht. Die Sicherheitsl\u00fccke erm\u00f6glicht eine Remote Code Execution (RCE), also das Ausf\u00fchren beliebigen Codes auf betroffenen Servern, und betrifft potenziell tausende Webanwendungen weltweit. Besonders gef\u00e4hrlich: Die [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/react2shell-cve-2025-55182\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-05T10:23:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-12T14:46:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/12\/code-1839406_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Franz D\u00fcck\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Franz D\u00fcck\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/\"},\"author\":{\"name\":\"Franz D\u00fcck\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/3efb68368f67fc9d7e0b08ce9b6ee473\"},\"headline\":\"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React &#038; Next.js (CVE-2025-55182 \\\/ CVE-2025-66478)\",\"datePublished\":\"2025-12-05T10:23:57+00:00\",\"dateModified\":\"2026-02-12T14:46:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/\"},\"wordCount\":613,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/code-1839406_1920.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/\",\"name\":\"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React & Next.js (CVE-2025-55182 \\\/ CVE-2025-66478) | LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/code-1839406_1920.jpg\",\"datePublished\":\"2025-12-05T10:23:57+00:00\",\"dateModified\":\"2026-02-12T14:46:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/code-1839406_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/code-1839406_1920.jpg\",\"width\":1920,\"height\":1282},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/react2shell-cve-2025-55182\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React &#038; Next.js (CVE-2025-55182 \\\/ CVE-2025-66478)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/3efb68368f67fc9d7e0b08ce9b6ee473\",\"name\":\"Franz D\u00fcck\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8ba0c5b324cbfbb79dbb35780014234543360eb3158a5d66884bf8ed33184847?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8ba0c5b324cbfbb79dbb35780014234543360eb3158a5d66884bf8ed33184847?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8ba0c5b324cbfbb79dbb35780014234543360eb3158a5d66884bf8ed33184847?s=96&d=mm&r=g\",\"caption\":\"Franz D\u00fcck\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React & Next.js (CVE-2025-55182 \/ CVE-2025-66478) | LocateRisk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/react2shell-cve-2025-55182\/","og_locale":"en_US","og_type":"article","og_title":"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React & Next.js (CVE-2025-55182 \/ CVE-2025-66478) | LocateRisk","og_description":"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React &amp; Next.js (CVE-2025-55182 \/ CVE-2025-66478) Am 3. Dezember 2025 wurde eine kritische Schwachstelle in den React Server Components und dem darauf aufbauenden Next.js Framework ver\u00f6ffentlicht. Die Sicherheitsl\u00fccke erm\u00f6glicht eine Remote Code Execution (RCE), also das Ausf\u00fchren beliebigen Codes auf betroffenen Servern, und betrifft potenziell tausende Webanwendungen weltweit. Besonders gef\u00e4hrlich: Die [&hellip;]","og_url":"https:\/\/locaterisk.com\/en\/react2shell-cve-2025-55182\/","og_site_name":"LocateRisk","article_published_time":"2025-12-05T10:23:57+00:00","article_modified_time":"2026-02-12T14:46:59+00:00","og_image":[{"width":1920,"height":1282,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/12\/code-1839406_1920.jpg","type":"image\/jpeg"}],"author":"Franz D\u00fcck","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Franz D\u00fcck","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/"},"author":{"name":"Franz D\u00fcck","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/3efb68368f67fc9d7e0b08ce9b6ee473"},"headline":"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React &#038; Next.js (CVE-2025-55182 \/ CVE-2025-66478)","datePublished":"2025-12-05T10:23:57+00:00","dateModified":"2026-02-12T14:46:59+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/"},"wordCount":613,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/12\/code-1839406_1920.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/","url":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/","name":"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React & Next.js (CVE-2025-55182 \/ CVE-2025-66478) | LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/12\/code-1839406_1920.jpg","datePublished":"2025-12-05T10:23:57+00:00","dateModified":"2026-02-12T14:46:59+00:00","breadcrumb":{"@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/12\/code-1839406_1920.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/12\/code-1839406_1920.jpg","width":1920,"height":1282},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/react2shell-cve-2025-55182\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"\u201eReact2Shell\u201c: Kritische Sicherheitsl\u00fccke in React &#038; Next.js (CVE-2025-55182 \/ CVE-2025-66478)"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/3efb68368f67fc9d7e0b08ce9b6ee473","name":"Franz D\u00fcck","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8ba0c5b324cbfbb79dbb35780014234543360eb3158a5d66884bf8ed33184847?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8ba0c5b324cbfbb79dbb35780014234543360eb3158a5d66884bf8ed33184847?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8ba0c5b324cbfbb79dbb35780014234543360eb3158a5d66884bf8ed33184847?s=96&d=mm&r=g","caption":"Franz D\u00fcck"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/6974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=6974"}],"version-history":[{"count":39,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/6974\/revisions"}],"predecessor-version":[{"id":7581,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/6974\/revisions\/7581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/7007"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=6974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=6974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=6974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}