A critical vulnerability (CVE-2025-55182) has been identified in the JavaScript library React, and several React-based frameworks and bundlers such as Next.js. This vulnerability has been given the maximum CVSS base score of 10.0 (Critical) and allows remote code execution enabling an attacker to take full control over the system.


A critical vulnerability (CVE-2025-55182) has been identified in the JavaScript library React, and several React-based frameworks and bundlers such as Next.js. This vulnerability has been given the maximum CVSS base score of 10.0 (Critical) and allows remote code execution enabling an attacker to take full control over the system.
react-server-dom-* packages are likely affected as the vulnerability is present in default configurations. This includes popular libraries such as Next.js, Vite RSC plugin, Parcel RSC plugin, React Router TSC preview, RedwoodSDK, Waku.This threat could affect any organisation who uses versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of:
react-server-dom-webpack
react-server-dom-parcel
react-server-dom-turbopack
This threat also affects Next.js 15.x and 16.x when using App Router. It also affects organisations using any of the 14.3 canary builds.
If your React code does not use React server-components, your app is not currently known to be affected by this vulnerability. If your app does not use a framework, bundler, or bundler plugin that supports React server-components, your app is not currently known to be affected by this vulnerability.
Due to the popularity and widespread use of the affected web application frameworks, combined with the low complexity of exploitation, it is likely that in-the-wild exploitation may increase in coming days and weeks. If this is the case, widespread disruption and breaches are possible. It is imperative for organisations to understand their own exposure and that of their supply chain to work together to ensure that appropriate remediation is actioned swiftly to prevent wider impact.
Affected vulnerable software should be updated to the fixed versions without delay.
react-server-dom-webpack
react-server-dom-parcel
react-server-dom-turbopack to versions 19.0.1, 19.1.2, and 19.2.1.15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, or 16.0.7 . Organisations running experimental canary releases should downgrade to a 14.x stable release or 14.3.0-canary.76.This is an evolving situation. You can keep up to date with the latest information on this threat by referring to the advisories from the affected vendors:
React advisory
Next advisory
NIST CVE-2025-55182
To understand how your supply chain is affected by React2Shell, create your free account on Risk Ledger. You can find out more about how the Emerging Threats feature on Risk Ledger works here.
Monthly research, case studies and practical guides you won't find anywhere else.
Join thousands of security managers turning their TPRM programmes into success stories.