nomisec
SCANNER
2,397 stars
by assetnote · poc
https://github.com/assetnote/react2shell-scanner
The repository contains a Python-based scanner for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using React Server Components. It includes both RCE proof-of-concept payloads and safe side-channel detection methods, with features for WAF bypass and Windows compatibility.
Classification
Scanner 95%
Target:
Next.js applications using React Server Components
No auth needed
Prerequisites:
Network access to the target application · Target application must be running a vulnerable version of Next.js with React Server Components
nomisec
WORKING POC
1,373 stars
by msanft · remote
https://github.com/msanft/CVE-2025-55182
This PoC demonstrates a prototype pollution vulnerability in React Server Functions (e.g., Next.js) leading to RCE via insecure deserialization in the React Flight Protocol. The exploit leverages prototype chain manipulation and a crafted thenable object to achieve arbitrary code execution during deserialization.
Classification
Working Poc 95%
Target:
React Server Functions (e.g., Next.js)
No auth needed
Prerequisites:
Access to a vulnerable Next.js server with React Server Functions enabled
nomisec
WORKING POC
1,026 stars
by lachlan2k · remote
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
This repository contains proof-of-concept exploits for CVE-2025-55182, targeting a vulnerability in React/Next.js applications. The exploit leverages a prototype pollution or deserialization flaw to achieve remote code execution (RCE) by manipulating form data and promise chains.
Classification
Working Poc 95%
Target:
Next.js (development builds with Webpack)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Network access to the target
nomisec
WORKING POC
793 stars
by ejpir · poc
https://github.com/ejpir/CVE-2025-55182-research
This repository contains a working proof-of-concept exploit for CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol. The exploit chains path traversal, fake chunk injection, and $B handler abuse to achieve remote code execution via Function(attacker_code).
Classification
Working Poc 95%
Target:
React Server Components (Flight Protocol)
No auth needed
Prerequisites:
Access to a vulnerable React Server Components endpoint
nomisec
WORKING POC
552 stars
by mrknow001 · poc
https://github.com/mrknow001/RSC_Detector
This repository contains a Chrome extension for detecting React Server Components (RSC) and Next.js App Router fingerprints, including both passive and active detection methods. It also includes an exploit for a remote code execution (RCE) vulnerability (CVE-2025-55182) via a crafted multipart/form-data payload.
Classification
Working Poc 90%
Target:
Next.js with React Server Components
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with RSC enabled · Attacker must be able to send crafted HTTP requests to the target
nomisec
SCANNER
311 stars
by emredavut · poc
https://github.com/emredavut/CVE-2025-55182
This repository contains a Chrome extension and auxiliary tools designed to detect and fingerprint React Server Components (RSC) and Next.js applications for CVE-2025-55182. It includes passive detection, active fingerprinting, and a Shodan scanner for identifying potentially vulnerable hosts.
Classification
Scanner 90%
Target:
React Server Components (RSC) / Next.js
No auth needed
Prerequisites:
Access to a Chrome browser · Shodan API key for scanning
nomisec
WORKING POC
274 stars
by zack0x01 · remote
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
This repository contains a functional exploit scanner for CVE-2025-55182, a React Server Components RCE vulnerability in Next.js applications. The script crafts a malicious multipart form request to execute arbitrary commands on vulnerable systems.
Classification
Working Poc 95%
Target:
Next.js applications using React Server Components
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with React Server Components · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
211 stars
by ynsmroztas · remote
https://github.com/ynsmroztas/NextRce
This is a functional exploit for CVE-2025-55182 targeting Next.js App Router. It includes detection logic and two exploitation modes (standard and UTF-16LE WAF bypass) to achieve remote code execution via prototype pollution and multipart form data manipulation.
Classification
Working Poc 95%
Target:
Next.js (App Router)
No auth needed
Prerequisites:
Target must be running Next.js with App Router · Target must be vulnerable to prototype pollution
nomisec
WORKING POC
128 stars
by pyroxenites · remote
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
This repository contains a Go-based exploit tool for CVE-2025-55182, targeting a Next.js RCE vulnerability. It includes multiple exploitation chains, WAF bypass techniques, and post-exploitation features like file management and memory shell injection.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Vulnerable Next.js application · Network access to the target
nomisec
SCANNER
112 stars
by fatguru · poc
https://github.com/fatguru/CVE-2025-55182-scanner
This repository contains a scanner for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC). The scanner detects exposed RSC endpoints and identifies potential attack surfaces, including WAF bypass techniques.
Classification
Scanner 95%
Target:
React Server Components (RSC) in Next.js
No auth needed
Prerequisites:
Exposed RSC endpoint · Next.js application with vulnerable configuration
nomisec
WORKING POC
108 stars
by BeichenDream · remote
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
This repository contains a functional exploit for CVE-2025-55182, which injects a Godzilla memory shell into a vulnerable Node.js application via prototype pollution and deserialization. The exploit establishes a persistent backdoor accessible via a custom HTTP header.
Classification
Working Poc 95%
Target:
Node.js applications vulnerable to CVE-2025-55182
No auth needed
Prerequisites:
Vulnerable Node.js application · Network access to the target · Godzilla key for payload encryption
nomisec
WORKING POC
102 stars
by Rsatan · poc
https://github.com/Rsatan/Next.js-Exploit-Tool
This repository contains a Go-based GUI tool for exploiting CVE-2025-55182 in Next.js, featuring RCE, file management, and memory shell injection capabilities. It integrates with tools like Godzilla and AntSword for post-exploitation.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Next.js instance · Network connectivity to the target
nomisec
WORKING POC
89 stars
by whiteov3rflow · poc
https://github.com/whiteov3rflow/CVE-2025-55182-poc
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical pre-authentication remote code execution vulnerability in React Server Components ([email protected]). The exploit leverages prototype chain pollution to achieve arbitrary command execution via a crafted multipart/form-data payload.
Classification
Working Poc 95%
Prerequisites:
Vulnerable React Server Components application running [email protected] · Network access to the target application
nomisec
WORKING POC
78 stars
by l4rm4nd · poc
https://github.com/l4rm4nd/CVE-2025-55182
This repository provides a minimal intentionally vulnerable Next.js environment to test security scanners against CVE-2025-55182, a pre-authentication RCE vulnerability in React Server Components. It includes a working exploit payload demonstrating command execution via unsafe deserialization.
Classification
Working Poc 100%
Target:
Next.js 16.0.6 with React 19.2.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js and React Server Components · Exposed Server Function endpoints
nomisec
WORKING POC
62 stars
by freeqaz · poc
https://github.com/freeqaz/react2shell
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC) and Next.js App Router. The exploit leverages prototype pollution in React's Flight protocol to achieve arbitrary code execution via crafted multipart POST requests.
Classification
Working Poc 100%
Target:
React Server Components (19.0.0-19.2.0), Next.js App Router (15.x-16.x before patches)
No auth needed
Prerequisites:
Network access to target server · Vulnerable React/Next.js version
nomisec
WORKING POC
61 stars
by dwisiswant0 · poc
https://github.com/dwisiswant0/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical arbitrary code execution vulnerability in React Server Components (RSC) due to improper validation in the `requireModule` function. The exploit leverages prototype chain pollution to access the global `Function` constructor and execute arbitrary code via crafted Flight payloads.
Classification
Working Poc 95%
Target:
react-server-dom-webpack 19.0.0
No auth needed
Prerequisites:
Node.js environment · Vulnerable version of react-server-dom-webpack (19.0.0) · Network access to the target server
nomisec
SCANNER
54 stars
by gensecaihq · poc
https://github.com/gensecaihq/react2shell-scanner
This repository contains a security scanner for CVE-2025-55182, a critical unauthenticated Remote Code Execution vulnerability in React Server Components. The scanner identifies vulnerable dependencies and endpoints without exploiting the vulnerability.
Classification
Scanner 100%
Target:
React Server Components (RSC) and frameworks using the RSC Flight protocol
No auth needed
Prerequisites:
Access to the target project or URL
nomisec
WORKING POC
46 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in Next.js React Server Components to achieve remote code execution (RCE). The exploit supports both direct command execution and reverse shell payloads, with a lab environment for testing.
Classification
Working Poc 95%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with React Server Components enabled · Network access to the target application
nomisec
WORKING POC
42 stars
by Spritualkb · remote
https://github.com/Spritualkb/CVE-2025-55182-exp
This repository contains a Python-based exploit for CVE-2025-55182, a critical RCE vulnerability in Next.js applications using React Server Components. The exploit leverages prototype pollution in the Flight protocol deserialization process to achieve arbitrary code execution.
Classification
Working Poc 95%
Target:
Next.js (15.x, 16.x) with App Router + Server Actions, react-server-dom-webpack (19.0.0 - 19.2.0)
No auth needed
Prerequisites:
Target running vulnerable Next.js version · Network access to the target
nomisec
SCANNER
38 stars
by sumanrox · poc
https://github.com/sumanrox/rschunter
RSC Hunter is a multi-threaded scanner designed to detect and exploit React Server Component (RSC) vulnerabilities using multiple strategies (Assetnote, Msanft, Split Payload, Vercel). It supports WAF bypass techniques, proxy routing, and CSV export for reporting.
Classification
Scanner 90%
Target:
React Server Component (RSC) implementations
No auth needed
Prerequisites:
Python 3.6+ · requests library · target URLs or list of URLs
nomisec
WRITEUP
36 stars
by kavienanj · remote
https://github.com/kavienanj/CVE-2025-55182
This repository is a detailed writeup explaining CVE-2025-55182, a critical vulnerability in React's Flight Protocol. It provides a step-by-step breakdown of the exploit chain, referencing React internals and community PoCs.
Classification
Writeup 100%
Target:
React v19.2.0 (React Server Components and Server Actions)
No auth needed
Prerequisites:
Access to a vulnerable React application using Server Components or Server Actions
nomisec
WORKING POC
32 stars
by MoLeft · remote
https://github.com/MoLeft/React2Shell-Toolbox
React2Shell Toolbox is a security testing toolkit built with Electron and Vue 3, designed to detect and exploit the Next.js React Server Actions prototype pollution vulnerability (CVE-2025-55182). It includes features for POC verification, virtual terminal interaction, and FOFA asset search.
Classification
Working Poc 95%
Target:
Next.js React Server Actions
No auth needed
Prerequisites:
Target running vulnerable Next.js React Server Actions · Network access to the target
nomisec
STUB
31 stars
by momika233 · poc
https://github.com/momika233/CVE-2025-55182-bypass
The repository contains only a README file with minimal information, lacking any exploit code or technical details. It appears to be a placeholder or stub for a WAF bypass related to CVE-2025-55182.
Target:
unknown
No auth needed
nomisec
WORKING POC
29 stars
by aliclub0x00 · poc
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
This repository provides a commercial PoC for CVE-2025-55182 (React2Shell), a critical RCE vulnerability in Next.js applications using React Server Components. The exploit leverages prototype pollution and deserialization flaws to achieve unauthenticated command execution.
Classification
Working Poc 90%
Target:
Next.js 15.x/16.x with App Router
No auth needed
Prerequisites:
Default Next.js application setup · Network access to the target
nomisec
WORKING POC
28 stars
by RuoJi6 · remote
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
This repository contains a Python-based exploit for CVE-2025-55182, which appears to be an RCE vulnerability. The script includes functionality for command execution and DNS interaction checking via Interactsh for verification.
Classification
Working Poc 90%
Target:
Unknown (CVE-2025-55182)
No auth needed
Prerequisites:
Network access to the target · Python environment with required libraries
nomisec
WORKING POC
26 stars
by Cr4at0r · poc
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
This repository contains a Burp Suite extension for detecting and exploiting CVE-2025-55182, a Next.js RCE vulnerability. It includes passive scanning, DNSLog detection via Burp Collaborator, and memory shell injection capabilities.
Classification
Working Poc | Scanner 90%
Target:
Next.js
No auth needed
Prerequisites:
Burp Suite · Next.js application with the vulnerability
nomisec
SCANNER
24 stars
by tobiasGuta · poc
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
This is a Burp Suite extension designed to scan for CVE-2025-55182, a Remote Code Execution (RCE) vulnerability in Next.js React Server Components (RSC). It sends a crafted multipart request to trigger a server crash and checks for a specific error signature to confirm vulnerability.
Classification
Scanner 95%
Target:
Next.js (App Router configurations)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with App Router
nomisec
WORKING POC
22 stars
by xalgord · remote
https://github.com/xalgord/React2Shell
This repository contains a functional Python-based exploit for CVE-2025-55182, targeting Next.js Server Actions. The exploit provides an interactive shell with features like command history, file transfer, and privilege escalation via a base64-encoded payload and sudo injection.
Classification
Working Poc 95%
Target:
Next.js (Server Actions)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with Server Actions enabled · Network access to the target application
nomisec
WORKING POC
22 stars
by surajhacx · remote
https://github.com/surajhacx/react2shellpoc
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, targeting a React Server Components vulnerability to achieve remote code execution (RCE). The exploit crafts a malicious multipart request to inject and execute arbitrary commands via prototype pollution and server-side JavaScript execution.
Classification
Working Poc 95%
Target:
React Server Components (specific version not specified)
No auth needed
Prerequisites:
Target application using vulnerable React Server Components · Network access to the target
nomisec
SCANNER
21 stars
by vijay-shirhatti · poc
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
This repository contains a Python-based scanner tool designed to detect React Server Components (RSC) and Next.js applications by analyzing HTTP responses for specific patterns in HTML content and headers. It is not an exploit but a detection utility for fingerprinting web technologies.
Classification
Scanner 100%
Target:
React Server Components (RSC) and Next.js applications
No auth needed
Prerequisites:
Python 3.7+ · requests library · target URLs
nomisec
WORKING POC
21 stars
by cybertechajju · remote
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
This repository contains a comprehensive toolkit for detecting and exploiting CVE-2025-55182 and CVE-2025-66478, which are critical RCE vulnerabilities in React Server Components and Next.js. It includes Nuclei templates, a Shodan scanner, a Bash exploit script, and a Burp Suite extension.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0), Next.js (15.x, 16.x with App Router)
No auth needed
Prerequisites:
Access to a vulnerable React Server Components or Next.js application · Shodan API key for mass scanning
nomisec
WORKING POC
20 stars
by ThemeHackers · poc
https://github.com/ThemeHackers/CVE-2025-55182
This repository contains a Python-based exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in a React-based application. The exploit includes payloads for RCE, WAF bypass techniques, and a scanner to detect vulnerable instances.
Classification
Working Poc 90%
Target:
React-based applications (specific version not specified)
No auth needed
Prerequisites:
Network access to the target application · Vulnerable React application with exposed endpoints
nomisec
WORKING POC
20 stars
by MrR0b0t19 · poc
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
This repository contains a functional Python-based exploit for CVE-2025-55182, a deserialization vulnerability in Next.js/React Server Components. It provides an interactive shell for remote command execution, vulnerability detection, and file transfer capabilities.
Classification
Working Poc 95%
Target:
Next.js/React Server Components
No auth needed
Prerequisites:
Python 3.8+ · requests library · Vulnerable Next.js/React Server Components instance
nomisec
WORKING POC
16 stars
by zack0x01 · remote
https://github.com/zack0x01/vuln-app-CVE-2025-55182
This repository contains a functional proof-of-concept for CVE-2025-55182, demonstrating a critical RCE vulnerability in React Server Components via unsafe deserialization. It includes a vulnerable Next.js application and an exploit script (`curl_id.sh`) to test the vulnerability.
Classification
Working Poc 95%
Target:
React Server Components (versions 19.0.0-19.2.0)
No auth needed
Prerequisites:
Vulnerable React version (19.0.0-19.2.0) · Exposed Next.js server action endpoint
nomisec
SCANNER
16 stars
by theori-io · poc
https://github.com/theori-io/reactguard
ReactGuard is a framework and vulnerability detection tool for CVE-2025-55182 (React2Shell) and related CVEs, targeting React Server Components implementations. It provides both CLI and Python API interfaces for scanning and identifying vulnerabilities in Next.js, Waku, and other frameworks.
Classification
Scanner 95%
Attack Type
Info Leak | Rce | Dos
Target:
React Server Components (Next.js 14-16, Waku 0.17-0.27, Expo, React Router, generic RSC)
No auth needed
Prerequisites:
Network access to the target application · React Server Components endpoint
nomisec
WORKING POC
15 stars
by AliHzSec · remote
https://github.com/AliHzSec/CVE-2025-55182
This repository contains a functional PoC for CVE-2025-55182, a critical RCE vulnerability in React Server Components due to unsafe deserialization. The tool supports both detection and exploitation modes, including interactive and reverse shell capabilities.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-turbopack, react-server-dom-parcel) versions 19.0.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Python 3.8+ · aiohttp library · network access to target
nomisec
WORKING POC
12 stars
by kOaDT · remote
https://github.com/kOaDT/poc-cve-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical pre-authentication remote code execution vulnerability in React Server Components. The exploit leverages unsafe deserialization and prototype pollution to execute arbitrary JavaScript code on the server.
Classification
Working Poc 95%
Target:
React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Vulnerable version of React Server Components · Network access to the target server
nomisec
SCANNER
11 stars
by BankkRoll · poc
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
This repository contains a browser-based scanner for detecting CVE-2025-55182 (React RSC RCE) and CVE-2025-66478 (Next.js RSC RCE) in GitHub repositories. It checks package.json files for vulnerable versions of React and Next.js packages.
Classification
Scanner 95%
Target:
GitHub repositories using React (19.0.0-19.2.0) or Next.js (14.3 canary, 15.x, 16.x)
No auth needed
Prerequisites:
Browser with DevTools access · GitHub account (optional for private repos)
nomisec
WORKING POC
11 stars
by sickwell · poc
https://github.com/sickwell/CVE-2025-55182
This is a functional exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in React Server Components. It achieves RCE by polluting Object.prototype.then and leveraging the Function constructor to execute arbitrary commands via spawnSync.
Classification
Working Poc 95%
Target:
React Server Components (specific version not specified)
No auth needed
Prerequisites:
Target must be running vulnerable React Server Components · Network access to the target
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-55182
This repository contains a functional SQL injection exploit for WordPress Quiz Maker (CVE-2025-10042), demonstrating time-based blind SQLi via crafted HTTP headers. The PoC includes methods for vulnerability detection, data extraction, and credential dumping.
Classification
Working Poc 95%
Target:
WordPress Quiz Maker <= 6.7.0.56
No auth needed
Prerequisites:
target WordPress URL · path to quiz page · vulnerable header (default: X-Forwarded-For)
nomisec
WORKING POC
10 stars
by shyambhanushali · remote
https://github.com/shyambhanushali/React2Shell
This is a Python-based PoC for CVE-2025-55182, exploiting a deserialization vulnerability in Next.js applications using React Server Components (RSC) to achieve remote code execution (RCE). The tool crafts a malicious payload that abuses RSC deserialization to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Next.js applications using React Server Components (RSC)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with RSC enabled · Network access to the target application
nomisec
WORKING POC
10 stars
by xcanwin · remote
https://github.com/xcanwin/CVE-2025-55182-React-RCE
This repository contains a functional exploit for CVE-2025-55182, a React Server RCE vulnerability. The PoC leverages React Server Components (RSC) features to bypass WAF detection and achieve remote code execution in React Server environments.
Classification
Working Poc 95%
Target:
React Server (19.0.0-19.2.0), Next.js (14.3.0-canary.77 to 16.0.6), Dify (1.1.2 to 1.10.1-fix.1)
No auth needed
Prerequisites:
Target running vulnerable React Server, Next.js, or Dify version · Network access to the target
nomisec
SCANNER
9 stars
by shamo0 · poc
https://github.com/shamo0/react2shell-PoC
This repository contains a Nuclei template for detecting React2Shell vulnerabilities (CVE-2025-55182 and CVE-2025-66478). It appears to be a detection tool rather than an exploit PoC.
Classification
Scanner 90%
Target:
React applications (version not specified)
No auth needed
Prerequisites:
Nuclei installed
nomisec
WORKING POC
8 stars
by StealthMoud · remote
https://github.com/StealthMoud/CVE-2025-55182-Scanner
This repository contains a comprehensive toolkit for CVE-2025-55182, a critical pre-authentication RCE vulnerability in React Server Components (versions 19.0.0-19.2.0). It includes a standalone exploit script, Nuclei templates, a web UI, and a vulnerable test environment for educational and authorized testing purposes.
Classification
Working Poc | Scanner 95%
Target:
React Server Components (react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack) versions 19.0.0 through 19.2.0
No auth needed
Prerequisites:
Docker (for full suite) · Node.js 18+ (for local setup) · Nuclei scanner (for advanced scanning)
nomisec
SCANNER
8 stars
by Pizz33 · poc
https://github.com/Pizz33/CVE-2025-55182-burpscanner
This is a Burp Suite extension designed to detect CVE-2025-55182 by analyzing HTTP requests and responses. It includes payload generation and vulnerability detection logic, but the full exploit details are truncated.
Classification
Scanner 90%
Target:
Unknown (CVE-2025-55182)
No auth needed
Prerequisites:
Burp Suite · Java 17 or lower
nomisec
WRITEUP
7 stars
by websecuritylabs · poc
https://github.com/websecuritylabs/React2Shell-Library
This repository is a curated list of resources regarding CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components known as 'React2Shell'. It includes links to official documentation, technical analyses, detection tools, and exploitation proofs of concept.
Classification
Writeup 100%
Target:
React Server Components (react-server-dom-webpack, parcel, turbopack)
No auth needed
Prerequisites:
Vulnerable version of React Server Components · Network access to the target application
nomisec
WORKING POC
7 stars
by BlackTechX011 · remote
https://github.com/BlackTechX011/React2Shell
React2Shell is a Python-based exploitation framework for CVE-2025-55182, targeting a pre-authentication RCE vulnerability in Next.js/React Server Functions via prototype pollution in React Flight Protocol deserialization. The tool includes scanning, exploitation, and post-exploitation modules with WAF evasion and stealth features.
Classification
Working Poc 95%
Target:
Next.js/React Server Functions (CVE-2025-55182)
No auth needed
Prerequisites:
Python 3.9+ · Vulnerable Next.js/React application
github
WRITEUP
7 stars
by cybersecplayground · poc
https://github.com/cybersecplayground/PoC-and-CVE-Reports/tree/main/2025/CVE-2025-55182.md
This repository provides a detailed technical analysis of CVE-2025-55182, a critical unauthenticated RCE vulnerability in React Server Components. It includes affected versions, mitigation steps, and references to external PoC and scanner tools.
Classification
Writeup 90%
Target:
React Server Components (React 19, Next.js 15.x/16.x, etc.)
No auth needed
Prerequisites:
Target application using React Server Components · Network access to the vulnerable server
nomisec
WORKING POC
7 stars
by sho-luv · remote
https://github.com/sho-luv/React2Shell
This repository contains a comprehensive toolkit for scanning and exploiting CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) frameworks like Next.js, Waku, and React Router. It includes CLI tools, browser extensions, lab environments, and Nuclei templates for detection and exploitation.
Classification
Working Poc 95%
Target:
React (19.0.0-19.2.0), Next.js (14.0.0-15.4.7), Waku (<0.27.2), React Router (7.0.0-7.5.0)
No auth needed
Prerequisites:
Vulnerable React/Next.js/Waku/React Router installation · Access to RSC endpoints
nomisec
SCANNER
7 stars
by im-ezboy · remote
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
This repository contains a Python-based scanner for CVE-2025-55182, which targets Next.js applications. It uses the Zoomeye API to search for vulnerable targets and includes functionality for parallel scanning and reporting.
Classification
Scanner 90%
Target:
Next.js
Auth required
Prerequisites:
Zoomeye API key · Python 3.8+ · requests and tqdm libraries
nomisec
WORKING POC
7 stars
by M4xSec · remote
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
This is a Python-based exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in Next.js/React applications to achieve remote code execution (RCE). The exploit uses async HTTP requests to send a crafted payload that leverages JavaScript prototype pollution to execute arbitrary commands via Node.js's child_process module.
Classification
Working Poc 95%
Target:
Next.js/React applications (specific version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js/React · Target must have the affected endpoint exposed
nomisec
WORKING POC
7 stars
by alsaut1 · poc
https://github.com/alsaut1/react2shell-lab
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, demonstrating unauthenticated remote code execution (RCE) in React Server Components via unsafe deserialization in the Flight protocol. The exploit leverages prototype pollution to execute arbitrary commands on vulnerable React/Next.js applications.
Classification
Working Poc 95%
Target:
React 19.0.0-19.2.0, Next.js 15.x-16.x
No auth needed
Prerequisites:
Vulnerable React/Next.js application running · Network access to the target server
nomisec
WRITEUP
7 stars
by GelukCrab · poc
https://github.com/GelukCrab/React-Server-Components-RCE
This is a README file describing a tool for exploiting a remote code execution vulnerability in React Server Components and Next.js. It provides detailed instructions on usage, affected versions, and attack modes.
Classification
Writeup 90%
Target:
React Server Components (19.0.0, 19.0.1, 19.1.x, 19.2.0), Next.js (v15.0.0-v15.0.4, v15.1.0-v15.1.8, v15.2.x-v15.5.6, v16.0.0-v16.0.6, v14.3.0-canary.77 and above)
No auth needed
Prerequisites:
Target running vulnerable versions of React Server Components or Next.js · Network access to the target
nomisec
WORKING POC
7 stars
by jctommasi · poc
https://github.com/jctommasi/react2shellVulnApp
This repository contains a deliberately vulnerable Next.js banking application designed to demonstrate CVE-2025-55182 (React) and CVE-2025-66478 (Next.js), which involve insecure deserialization in the RSC Flight protocol. The app is configured with unpatched React 19.0.0 and Next.js 15.0.3 to allow testing of React2Shell vulnerabilities.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
React 19.0.0, Next.js 15.0.3
No auth needed
Prerequisites:
Access to the vulnerable application · Knowledge of RSC Flight protocol exploitation
nomisec
SCANNER
7 stars
by heiheishushu · poc
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
This repository contains a Python script designed to detect whether a website uses React Server Components (RSC) or Next.js by checking for specific HTML markers, content types, and headers. It is not an exploit but a detection tool for identifying potential targets affected by CVE-2025-55182 and CVE-2025-66478.
Classification
Scanner 100%
Target:
React Server Components (RSC) and Next.js
No auth needed
Prerequisites:
Network access to the target website
nomisec
SCANNER
6 stars
by fBUZk2BH · poc
https://github.com/fBUZk2BH/RSC-Detect-CVE-2025-55182
This repository contains a Python-based scanner designed to detect React Server Components (RSC) and Next.js applications by analyzing HTTP responses for specific patterns and headers. It is not an exploit but a reconnaissance tool for fingerprinting web technologies.
Classification
Scanner 95%
Target:
React Server Components (RSC) and Next.js applications
No auth needed
Prerequisites:
Python 3.7+ · requests library
nomisec
WORKING POC
6 stars
by keklick1337 · poc
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
This repository contains a Go-based PoC for CVE-2025-55182, a critical RCE vulnerability in React Server Components (Flight protocol) affecting specific versions of Next.js and react-server-dom-webpack. The exploit leverages prototype pollution in Flight protocol deserialization to achieve arbitrary code execution.
Classification
Working Poc 95%
Target:
Next.js (15.x, 16.x), react-server-dom-webpack (19.0.0-19.2.0)
No auth needed
Prerequisites:
Target running vulnerable version of Next.js or react-server-dom-webpack · Network access to the target server
nomisec
WORKING POC
6 stars
by zzhorc · remote
https://github.com/zzhorc/CVE-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, targeting a vulnerability in Next.js and React Server Components (RSC). The exploit includes both a scanner for detecting vulnerable instances and a script for achieving remote code execution (RCE) via crafted multipart POST requests.
Classification
Working Poc 95%
Target:
Next.js (15.x, 16.x with App Router) and React Core (19.0.0 to 19.2.0)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js and React · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
6 stars
by acheong08 · remote
https://github.com/acheong08/CVE-2025-55182-poc
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, targeting prototype pollution in React Server Components (RSC) in Next.js and Vite. The exploit achieves remote code execution (RCE) by crafting malicious multipart form data payloads.
Classification
Working Poc 95%
Target:
Next.js and Vite with React Server Components
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js or Vite with RSC enabled · Network access to the target application
nomisec
WORKING POC
5 stars
by AdityaBhatt3010 · remote
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web
This is a functional PoC for CVE-2025-55182, exploiting an unsafe deserialization flaw in React Server Components (RSC) to achieve remote code execution (RCE) via crafted Flight protocol chunks. The exploit leverages prototype pollution and Function constructor access to execute arbitrary commands on the server.
Classification
Working Poc 100%
Target:
React Server Components (RSC) in React 19.x and Next.js
No auth needed
Prerequisites:
Target running vulnerable React/Next.js version · Network access to the target server
nomisec
WORKING POC
5 stars
by Security-Phoenix-demo · poc
https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478
This repository contains a scanner and exploit PoC for CVE-2025-55182 and CVE-2025-66478, which are unauthenticated RCE vulnerabilities in React Server Components (RSC) and Next.js. The scanner detects vulnerable dependencies, while the exploit demonstrates command execution on affected systems.
Classification
Working Poc | Scanner 95%
Target:
React Server Components (RSC) and Next.js (specific versions not detailed in the provided content)
No auth needed
Prerequisites:
Vulnerable React/Next.js installation · Network access to the target application
nomisec
WORKING POC
5 stars
by ejpir · poc
https://github.com/ejpir/CVE-2025-55182-bypass
This repository provides a working proof-of-concept exploit for CVE-2025-55182, demonstrating a header bypass technique to achieve remote code execution (RCE) in Next.js applications without requiring the 'Next-Action' header, thus evading WAF detection.
Classification
Working Poc 95%
Target:
Next.js (versions 15.x, 16.x) and react-server-dom-webpack (versions 19.0.0 - 19.2.0)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send crafted HTTP requests
nomisec
WORKING POC
5 stars
by CirqueiraDev · remote
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
This repository contains a Python-based mass exploit scanner for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) due to insecure deserialization. The exploit leverages crafted HTTP requests to execute arbitrary commands via prototype pollution and child_process.execSync.
Classification
Working Poc 95%
Target:
React Server Components (RSC) in react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack (versions 19.0.0-19.2.0)
No auth needed
Prerequisites:
Target must be running a vulnerable version of RSC · Network access to the target server
nomisec
WORKING POC
5 stars
by pax-k · poc
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
This repository contains a proof-of-concept exploit for CVE-2025-55182, a critical pre-authentication Remote Code Execution (RCE) vulnerability in React Server Components (RSC) Flight protocol. The exploit leverages insecure deserialization to achieve prototype pollution and execute arbitrary commands on vulnerable Next.js applications.
Classification
Working Poc 95%
Target:
Next.js (15.x, 16.x, 14.3.0-canary.77 and later) and React packages (19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Vulnerable version of Next.js or React packages · Network access to the target application
nomisec
SCANNER
5 stars
by nehkark · poc
https://github.com/nehkark/CVE-2025-55182
This repository contains a passive scanner for detecting Next.js applications vulnerable to React2Shell-style exploits (CVE-2025-55182). It fingerprints Next.js and React Server Components (RSC) and sends a benign React Flight payload to check for vulnerability without executing OS commands.
Classification
Scanner 95%
Target:
Next.js with React Server Components
No auth needed
Prerequisites:
Target must be a Next.js application with RSC enabled
nomisec
SCANNER
5 stars
by ZihxS · poc
https://github.com/ZihxS/check-react-rce-cve-2025-55182
This repository contains a scanner tool for detecting CVE-2025-55182 and CVE-2025-66478 vulnerabilities in React and Next.js projects using React Server Components (RSC). It scans for vulnerable package versions and RSC usage patterns.
Classification
Scanner 100%
Target:
React (19.0.0 < 19.0.1), Next.js (v15.0.x < 15.0.5)
No auth needed
Prerequisites:
Node.js 16 or higher · npm or yarn · Access to the target project's node_modules and source code
github
WORKING POC
4 stars
by ctkqiang · gopoc
https://github.com/ctkqiang/CVE-Exploits/tree/main/CVE-2025-55182
This repository contains a functional PoC for CVE-2025-55182 (React2Shell), a prototype pollution vulnerability in Next.js Server Actions leading to RCE. The exploit sends a crafted multipart/form-data payload to trigger deserialization flaws and checks for RCE indicators in the response.
Classification
Working Poc 95%
Target:
Next.js (Server Actions)
No auth needed
Prerequisites:
Target URL with Server Action · Next-Action ID from headers
nomisec
WORKING POC
4 stars
by hidden-investigations · remote
https://github.com/hidden-investigations/react2shell-scanner
This repository contains a Python-based PoC exploit for CVE-2025-55182, targeting misconfigured React Server Components or Next.js applications. The tool allows command execution via a crafted request and includes features like WAF bypass techniques and safe check mode.
Classification
Working Poc 95%
Target:
React Server Components / Next.js
No auth needed
Prerequisites:
Access to a vulnerable React Server Components or Next.js application · Python 3.8+ environment
nomisec
WORKING POC
4 stars
by kondukto-io · poc
https://github.com/kondukto-io/vulnerable-next-js-poc
This repository contains a functional proof-of-concept for CVE-2025-55182, a critical deserialization vulnerability in React Server Components affecting React 19.x and Next.js 15.x-16.x. The exploit demonstrates remote code execution via crafted Flight protocol payloads.
Classification
Working Poc 95%
Target:
React 19.0.0-19.2.0, Next.js 15.0.0-16.0.6
No auth needed
Prerequisites:
Node.js 18+ · Python 3.x · npm/yarn
nomisec
WORKING POC
4 stars
by zr0n · remote
https://github.com/zr0n/react2shell
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, targeting a deserialization vulnerability in Next.js applications using React Server Components. The exploit allows remote code execution through crafted POST requests with malicious payloads.
Classification
Working Poc 95%
Target:
Next.js (14.3.0-canary.77 to 16.x) and React (19.0 to 19.2.0)
No auth needed
Prerequisites:
Vulnerable Next.js/React version · Network access to target application
nomisec
WORKING POC
4 stars
by LemonTeatw1 · remote
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
This exploit targets a Next.js application vulnerability (CVE-2025-55182) by leveraging prototype pollution and server-side JavaScript injection to achieve remote command execution (RCE). The payload manipulates the Next.js request handling to execute arbitrary commands via child_process.execSync.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target must be a vulnerable Next.js application · Network access to the target
nomisec
WORKING POC
4 stars
by yanoshercohen · poc
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
This is a functional exploit for CVE-2025-55182, targeting a deserialization vulnerability in Next.js React Server Components (RSC). The PoC constructs a malicious payload to achieve remote code execution (RCE) via JavaScript injection, leveraging prototype pollution and multipart form data.
Classification
Working Poc 95%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with RSC enabled · Network access to the target endpoint
nomisec
WORKING POC
4 stars
by c0rydoras · poc
https://github.com/c0rydoras/CVE-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in React 19 Server Components with Next.js. The exploit leverages malformed FormData to achieve arbitrary code execution via deserialization flaws.
Classification
Working Poc 90%
Target:
React 19 Server Components with Next.js
No auth needed
Prerequisites:
Access to a vulnerable Next.js application with React 19 Server Components · Network access to the target server
nomisec
WRITEUP
4 stars
by santihabib · poc
https://github.com/santihabib/CVE-2025-55182-analysis
This is a detailed technical writeup analyzing CVE-2025-55182, a critical vulnerability in Next.js and React, leading to unauthenticated RCE via prototype traversal and Blob deserialization sink exploitation.
Classification
Writeup 100%
Target:
Next.js ≤15.0.5 + React 19.0.0
No auth needed
Prerequisites:
Next.js application with Server Actions enabled · React 19.0.0 or vulnerable versions
nomisec
WORKING POC
4 stars
by EynaExp · poc
https://github.com/EynaExp/CVE-2025-55182-POC
This repository contains a Python-based proof-of-concept (PoC) scanner for CVE-2025-55182, demonstrating a command injection vulnerability via a JSON-based POST request. The tool allows security researchers to verify vulnerability by sending commands and retrieving execution output.
Classification
Working Poc 95%
Target:
React.js applications (specific version not specified)
No auth needed
Prerequisites:
Python 3.x · requests library · target URLs list · DNS endpoint for command output
nomisec
WORKING POC
4 stars
by hualy13 · remote
https://github.com/hualy13/CVE-2025-55182
This is a functional exploit for CVE-2025-55182, targeting a Next.js application vulnerability that allows remote code execution (RCE) via prototype pollution and server-side JavaScript injection. The script includes both a vulnerability scanner and an interactive shell for post-exploitation.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified in code)
No auth needed
Prerequisites:
Network access to the target Next.js application · Vulnerable endpoint exposed
github
WORKING POC
3 stars
by Pocland-db · c++poc
https://github.com/Pocland-db/cve-pocs/tree/main/2025/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, demonstrating remote code execution (RCE) in React Server Components, including Next.js with the App Router. The exploit crafts a malicious multipart form request to trigger arbitrary command execution via prototype pollution and server-side rendering manipulation.
Classification
Working Poc 95%
Target:
React Server DOM packages (react-server-dom-parcel, react-server-dom-webpack, react-server-dom-turbopack) versions 19.0, 19.1.0, 19.1.1, 19.2.0; Next.js with App Router
No auth needed
Prerequisites:
Target application using vulnerable React Server DOM packages · Network access to the target server
nomisec
WORKING POC
3 stars
by AdityaBhatt3010 · poc
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182
This repository contains a proof-of-concept exploit for CVE-2025-55182, a critical deserialization vulnerability in React Server Components (RSC) leading to unauthenticated remote code execution (RCE). The exploit leverages unsafe deserialization in the React Flight protocol to achieve arbitrary JavaScript execution via prototype chain manipulation.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions < 19.0.1, < 19.1.2, < 19.2.1
No auth needed
Prerequisites:
Target running vulnerable React Server Components · Network access to the target server
nomisec
SCANNER
3 stars
by Updatelap · remote
https://github.com/Updatelap/CVE-2025-55182
This repository contains a Burp Suite extension designed to scan for CVE-2025-55182, a React RCE vulnerability. The tool captures URLs, applies filters, and checks for vulnerability indicators like 'digest' in responses.
Classification
Scanner 90%
Target:
React applications (version not specified)
No auth needed
Prerequisites:
Burp Suite (Community Edition or higher) · HTTP/HTTPS traffic captured in Proxy
nomisec
WORKING POC
3 stars
by chrahman · remote
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical pre-authentication RCE vulnerability in React Server Components (RSC) Flight protocol due to insecure deserialization. The exploit leverages prototype pollution to achieve arbitrary command execution on vulnerable Next.js applications.
Classification
Working Poc 95%
Target:
Next.js (15.x, 16.x, 14.3.0-canary.77 and later) and React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Vulnerable version of Next.js or React Server Components · Network access to the target application
nomisec
WORKING POC
3 stars
by MammaniNelsonD · remote
https://github.com/MammaniNelsonD/React2P4IM0Nshell
This repository contains a Chrome extension PoC for exploiting CVE-2025-55182, targeting Next.js and React Server Components (RSC) with RCE, source leak, and DoS capabilities. The exploit leverages deserialization vulnerabilities to execute arbitrary commands via crafted JSON payloads.
Classification
Working Poc 90%
Attack Type
Rce | Info Leak | Dos | Deserialization
Target:
Next.js with React Server Components (RSC)
No auth needed
Prerequisites:
Target application using Next.js with RSC · Access to the vulnerable endpoint · Chrome browser for extension deployment
nomisec
WORKING POC
3 stars
by TheStingR · poc
https://github.com/TheStingR/ReactOOPS-WriteUp
This repository contains a working PoC for CVE-2025-55182, a critical unauthenticated RCE vulnerability in React Server Components and Next.js App Router due to a missing hasOwnProperty check in Flight protocol deserialization.
Classification
Working Poc 95%
Target:
Next.js 16.0.6 with React 19
No auth needed
Prerequisites:
Access to the target server's HTTP endpoint
nomisec
WORKING POC
3 stars
by yz9yt · remote
https://github.com/yz9yt/React2Shell-CTF
This repository provides a Dockerized CTF challenge simulating CVE-2025-55182, a critical RCE vulnerability in React Server Components. The exploit leverages malicious JSON payloads to achieve arbitrary code execution via the `eval()` function.
Classification
Working Poc 95%
Target:
React Server Components (Next.js)
No auth needed
Prerequisites:
Docker · Docker Compose · Node.js environment
nomisec
SCANNER
3 stars
by anuththara2007-W · poc
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
This repository contains a Chrome extension designed to detect React Server Components (RSC) and Next.js App Router fingerprints. It includes passive and active detection methods but does not contain exploit code for CVE-2025-55182.
Classification
Scanner 90%
Target:
React Server Components (RSC) and Next.js App Router
No auth needed
Prerequisites:
Chrome browser · Access to target web pages
nomisec
WORKING POC
3 stars
by Tiger-Foxx · remote
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
This repository contains a Proof of Concept (PoC) for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC) due to insecure deserialization. The toolkit includes a browser extension for detection and exploitation, a proxy server to bypass CORS, and a Shodan scanner for identifying vulnerable hosts.
Classification
Working Poc 90%
Target:
React Server Components (RSC) in React 19.0-19.2.0 and Next.js 14.3.0-canary.77+
No auth needed
Prerequisites:
Target application must use React Server Components (RSC) · Exposed endpoint handled by the RSC server
nomisec
SCANNER
3 stars
by VeilVulp · remote
https://github.com/VeilVulp/RscScan-cve-2025-55182
RscScan is a professional cross-platform vulnerability scanner designed to detect CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in Next.js Server Actions caused by prototype pollution. The tool provides multi-threaded scanning, real-time progress tracking, and multiple export formats for results.
Classification
Scanner 95%
Target:
Next.js Server Actions
No auth needed
Prerequisites:
Target running vulnerable Next.js Server Actions · Network access to the target
nomisec
WORKING POC
3 stars
by alfazhossain · remote
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
This repository contains a Chrome extension PoC for CVE-2025-55182, targeting Next.js App Router RSC deserialization vulnerabilities. It includes passive/active scanning and a 1-click RCE exploit via prototype pollution in multipart payloads.
Classification
Working Poc 90%
Target:
Next.js ≥ v13.0.0 & < v15.0.5 (App Router + RSC)
No auth needed
Prerequisites:
Target must be running vulnerable Next.js version with RSC enabled · Attacker must be able to send HTTP requests to the target
nomisec
SCANNER
3 stars
by techgaun · poc
https://github.com/techgaun/cve-2025-55182-scanner
This repository provides a Python-based scanner for detecting indicators of compromise (IoCs) related to CVE-2025-55182, a React Server Components RCE vulnerability. It checks for filesystem artifacts, suspicious processes, systemd services, cron entries, and JavaScript XOR injection patterns.
Classification
Scanner 100%
Target:
React Server Components
No auth needed
Prerequisites:
Access to the target system · Python 3.8+
nomisec
SCANNER
3 stars
by xiaopeng-ye · remote
https://github.com/xiaopeng-ye/react2shell-detector
This repository contains a Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) by sending safe payloads to target URLs and analyzing responses. It is a reimplementation of the Assetnote react2shell-scanner as a browser extension.
Classification
Scanner 95%
Target:
Web applications using React
No auth needed
Prerequisites:
Chrome browser · Node.js and pnpm for building from source
nomisec
WORKING POC
3 stars
by AggressiveUser · remote
https://github.com/AggressiveUser/React2Hell
This repository contains a functional exploit for CVE-2025-55182, a pre-authentication RCE vulnerability in React Server Components (versions 19.0.0-19.2.0) due to unsafe deserialization in Server Function endpoints. The exploit crafts a malicious payload to execute arbitrary commands via child_process.execSync.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack) versions 19.0.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Target running vulnerable React Server Components · Network access to the target server
nomisec
WORKING POC
3 stars
by rubensuxo-eh · remote
https://github.com/rubensuxo-eh/react2shell-exploit
This repository contains a functional exploit for CVE-2025-55182, a critical RCE vulnerability in Next.js applications. It includes a Python-based exploit script, Docker-based vulnerable lab, and Burp Suite/Nuclei templates for validation.
Classification
Working Poc 95%
Target:
Next.js < 16.0.7
No auth needed
Prerequisites:
Docker for lab environment · Python 3.x for exploit script
nomisec
WORKING POC
3 stars
by Syrins · remote
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
This repository contains a GUI-based exploit tool for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) and Next.js. The exploit leverages crafted HTTP requests to execute arbitrary commands on vulnerable servers.
Classification
Working Poc 95%
Target:
React Server Components (RSC) / Next.js (React 19)
No auth needed
Prerequisites:
Vulnerable React Server Components or Next.js endpoint · Network access to the target
nomisec
WORKING POC
3 stars
by hoosin · poc
https://github.com/hoosin/CVE-2025-55182
This repository contains a Go-based PoC for CVE-2025-55182, a Next.js RCE vulnerability exploiting unsafe deserialization in React Server Components (RSC). The exploit crafts a malicious multipart/form-data request to execute arbitrary commands via child_process.execSync.
Classification
Working Poc 95%
Target:
Next.js 15.x < 15.0.5, 16.x < 16.0.7
No auth needed
Prerequisites:
Target running vulnerable Next.js version · Network access to the target
nomisec
WORKING POC
3 stars
by timsonner · remote
https://github.com/timsonner/React2Shell-CVE-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in Next.js 15.4.7. The exploit leverages a malicious multipart form request to achieve remote code execution (RCE) via JavaScript prototype manipulation.
Classification
Working Poc 95%
Target:
Next.js 15.4.7
No auth needed
Prerequisites:
Target server running Next.js 15.4.7 · Network access to the target server
nomisec
SCANNER
3 stars
by grp-ops · remote
https://github.com/grp-ops/react2shell
The repository contains a scanner for detecting CVE-2025-55182 and CVE-2025-66478, which are deserialization RCE vulnerabilities in React Server Components and Next.js Server Actions. The scanner includes version fingerprinting and out-of-band RCE confirmation via DNS/HTTP callbacks.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
React (19.0.0–19.2.0), Next.js (14.3.0-canary.77 through 16.0.6)
No auth needed
Prerequisites:
Network access to the target application · Target must be running a vulnerable version of React or Next.js
nomisec
WORKING POC
3 stars
by Cillian-Collins · poc
https://github.com/Cillian-Collins/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a React2Shell vulnerability involving unsafe deserialization in React. The exploit leverages prototype pollution to achieve remote code execution (RCE) via a crafted multipart/form-data payload.
Classification
Working Poc 95%
Target:
React (specific version not specified, but referenced as vulnerable in the PoC)
No auth needed
Prerequisites:
Target application must be running a vulnerable version of React · Network access to the target application
nomisec
WORKING POC
3 stars
by jf0x3a · poc
https://github.com/jf0x3a/CVE-2025-55182-exploit
This is a functional exploit for CVE-2025-55182, targeting an SSRF/RCE vulnerability in React/NextJS applications using the experimental-form feature. The PoC sends crafted multipart form data to trigger remote code execution via Node.js child_process module.
Classification
Working Poc 95%
Target:
React 19.0.0-19.2.0, NextJS 15.0.0-16.0.0
No auth needed
Prerequisites:
Target must have vulnerable React/NextJS version · Target must expose the formaction endpoint · Network access to target
nomisec
SCANNER
3 stars
by M0onPu15e · poc
https://github.com/M0onPu15e/next.js-scanner
This repository contains a scanner for detecting exposure to CVE-2025-55182, a React Server Components (RSC) remote code execution vulnerability. The scanner sends HTTP requests with specific headers to probe for RSC endpoints and analyzes responses for indicators of vulnerability.
Classification
Scanner 95%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Network access to the target Next.js application
nomisec
SCANNER
3 stars
by xkillbit · poc
https://github.com/xkillbit/cve-2025-55182-scanner
This repository contains a scanner for detecting systems vulnerable to CVE-2025-55182, a critical unauthenticated remote code execution vulnerability in React Server Components (RSC) Flight protocol. The scanner uses passive fingerprinting and protocol probing to identify potentially vulnerable systems without attempting exploitation.
Classification
Scanner 95%
Target:
React Server Components (RSC) Flight protocol (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack, Next.js)
No auth needed
Prerequisites:
Network access to the target system · Target system running a vulnerable version of React Server Components or Next.js
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-55182
This repository contains a functional exploit PoC for CVE-2025-55182, demonstrating a prototype chain vulnerability in React Server Components that leads to remote code execution (RCE). The exploit leverages improper property access in the `requireModule` function, allowing attackers to execute arbitrary JavaScript via modules like `vm`, `child_process`, and `fs`.
Classification
Working Poc 100%
Target:
react-server-dom-webpack < 19.2.0, react-server-dom-turbopack < 19.2.0
No auth needed
Prerequisites:
Node.js environment · Vulnerable version of react-server-dom-webpack or react-server-dom-turbopack
nomisec
SCANNER
2 stars
by MuhammadUwais · poc
https://github.com/MuhammadUwais/React2Shell
This is a Firefox extension designed to detect React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) by passively monitoring and actively probing for indicators in web applications. It includes WAF detection and manual command execution for authorized testing.
Classification
Scanner 90%
Target:
React Server Components (RSC) and Next.js App Router
No auth needed
Prerequisites:
Firefox browser · Access to target web application
nomisec
WRITEUP
2 stars
by MemerGamer · poc
https://github.com/MemerGamer/CVE-2025-55182
This repository contains documentation for CVE-2025-55182 (React2Shell), providing details in both web and PDF formats. No exploit code is present, only references to external documentation.
Classification
Writeup 90%
Target:
unspecified (React2Shell)
No auth needed
Prerequisites:
access to documentation
nomisec
WORKING POC
2 stars
by AsadAhmad-1337 · remote
https://github.com/AsadAhmad-1337/React-2-Shell
This repository contains a Python-based exploit for CVE-2025-55182, targeting a Remote Code Execution (RCE) vulnerability in React Server Components (RSC). The exploit supports multiple techniques, payload generation, and evasion features.
Classification
Working Poc 95%
Target:
React Server Components (RSC)
No auth needed
Prerequisites:
Python 3.6+ · requests library · urllib3 library
github
WORKING POC
2 stars
by exploitChains · pythonpoc
https://github.com/exploitChains/poc-collection/tree/main/CVE-2025-55182
The repository contains a functional exploit for CVE-2025-15158, demonstrating an authenticated arbitrary file upload vulnerability in the WordPress WP Enable WebP plugin (≤1.0). The PoC includes a Python script that logs in, retrieves a nonce, and uploads a malicious file bypassing extension checks.
Classification
Working Poc 95%
Target:
WordPress Plugin - WP Enable WebP ≤ 1.0
Auth required
Prerequisites:
WordPress site with WP Enable WebP plugin ≤1.0 · Author+ user credentials
nomisec
WORKING POC
2 stars
by Faithtiannn · remote
https://github.com/Faithtiannn/CVE-2025-55182
This repository contains a Java-based GUI tool for detecting and exploiting CVE-2025-55182, a command injection vulnerability in Next.js. The tool supports vulnerability scanning, command execution, memory shell injection, and reverse shell functionality.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target running vulnerable Next.js instance · Network access to the target
nomisec
SCANNER
2 stars
by rix4uni · remote
https://github.com/rix4uni/CVE-2025-55182
This repository provides a command-line tool for detecting and exploiting CVE-2025-55182, a prototype pollution vulnerability in Next.js applications using React Server Components. The tool allows for remote command execution via crafted HTTP POST requests with multipart/form-data.
Classification
Scanner 90%
Target:
Next.js applications with specific configurations
No auth needed
Prerequisites:
Target application must be running a vulnerable version of Next.js with React Server Components
nomisec
SCANNER
2 stars
by lucyz1125 · remote
https://github.com/lucyz1125/CVE-2025-55182-Next.js-RCE
This repository provides a GUI-based security assessment tool for testing Next.js applications against CVE-2025-55182. It includes features for vulnerability identification, patch verification, and detailed reporting, with built-in safeguards to prevent misuse.
Classification
Scanner 90%
Target:
Next.js (specific versions affected by CVE-2025-55182)
No auth needed
Prerequisites:
Go 1.24 or higher · Fyne dependencies · Internet connection
nomisec
SCANNER
2 stars
by nxgn-kd01 · poc
https://github.com/nxgn-kd01/react2shell-scanner
This repository contains a scanner for CVE-2025-55182 (React2Shell), a critical RCE vulnerability in React Server Components. The scanner detects vulnerable React 19.x versions, framework configurations, and Server Function usage.
Classification
Scanner 100%
Target:
React 19.x, Next.js 14-16.x, react-router, waku, @parcel/rsc, expo
No auth needed
Prerequisites:
React 19.x with Server Components enabled
nomisec
SCANNER
2 stars
by guiimoraes · poc
https://github.com/guiimoraes/react2shell-evolved
The repository contains a scanner for detecting RCE vulnerabilities in React Server Components (RSC) and Next.js applications, specifically targeting CVE-2025-55182 and CVE-2025-66478. It includes both safe side-channel detection and RCE PoC capabilities with dynamic command result extraction.
Classification
Scanner 95%
Target:
React Server Components (RSC) and Next.js
No auth needed
Prerequisites:
Python 3.8 or higher · requests and tqdm libraries · target URL or list of URLs
nomisec
WORKING POC
2 stars
by theman001 · remote
https://github.com/theman001/CVE-2025-55182
This repository contains a proof-of-concept exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) affecting React 19.x and Next.js. The exploit leverages prototype chain manipulation via `requireModule()` to achieve remote code execution.
Classification
Working Poc 95%
Target:
React.js (19.0.0-19.2.0), Next.js (14.3.0-16.0.6)
No auth needed
Prerequisites:
Target server running vulnerable React/Next.js version · Network access to the target server
nomisec
WORKING POC
2 stars
by mil4ne · remote
https://github.com/mil4ne/CVE-2025-55182-React2Shell
This PoC demonstrates a remote code execution (RCE) vulnerability in React Server Components, specifically targeting Next.js applications using the App Router. It exploits a deserialization flaw in vulnerable versions of react-server-dom packages to execute arbitrary commands via crafted multipart form data.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-parcel, react-server-dom-webpack, react-server-dom-turbopack) versions 19.0, 19.1.0, 19.1.1, 19.2.0; Next.js with App Router
No auth needed
Prerequisites:
Target application using vulnerable versions of react-server-dom packages · Network access to the target application
nomisec
WORKING POC
2 stars
by RavinduRathnayaka · poc
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
This is a functional Proof of Concept (PoC) for CVE-2025-66478, exploiting a prototype pollution vulnerability in Next.js Server Components to achieve Remote Code Execution (RCE) via crafted multipart/form-data payloads.
Classification
Working Poc 95%
Target:
Next.js (specific versions using React Server Components)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with React Server Components enabled · Network access to the target application
nomisec
WORKING POC
2 stars
by subhdotsol · poc
https://github.com/subhdotsol/CVE-2025-55182
This repository contains a fully functional exploit for CVE-2025-55182 (React2Shell), demonstrating unauthenticated Remote Code Execution (RCE) in React Server Components and Next.js via prototype pollution and insecure deserialization. The exploit includes a Go-based interactive shell and a deliberately vulnerable Next.js server for testing.
Classification
Working Poc 95%
Target:
React 19.0.0-19.2.0, Next.js 15.x-16.x with Server Actions
No auth needed
Prerequisites:
Vulnerable Next.js server with Server Actions enabled · Network access to the target server
nomisec
WORKING POC
2 stars
by hidden-investigations · poc
https://github.com/hidden-investigations/react2shell-vulnlab
This repository is a vulnerable web application lab designed to demonstrate CVE-2025-55182 (React) and CVE-2025-66478 (Next.js), which involve insecure deserialization in the RSC Flight protocol leading to potential RCE. It provides a Docker-based environment for testing and understanding the vulnerability.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
React 19.0.0, Next.js 15.0.3
No auth needed
Prerequisites:
Access to the vulnerable application · Ability to send crafted requests to exploit deserialization
nomisec
WORKING POC
2 stars
by sangleshubham · remote
https://github.com/sangleshubham/React-Security-CVE-2025-55182-Exploit
This repository contains a functional Proof of Concept (PoC) exploit for CVE-2025-55182, a critical remote code execution (RCE) vulnerability in React Server Components (React 19 / Next.js). The exploit leverages prototype pollution and redirect smuggling to execute arbitrary commands on vulnerable servers.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack 19.0.0-19.2.0, Next.js 13.4.x, 14.x pre-14.2.35, 15.x pre-15.5.9)
No auth needed
Prerequisites:
Vulnerable version of react-server-dom-webpack or Next.js · Access to a target server running the vulnerable software
nomisec
SCANNER
2 stars
by TrixSec · poc
https://github.com/TrixSec/CVE-2025-55182-Scanner
This repository contains a hybrid security scanner for CVE-2025-55182, designed to perform static and dynamic analysis on Next.js/Waku applications to detect vulnerabilities related to React Server Components (RSC). The tool checks for vulnerable dependencies and unsafe RSC patterns without executing harmful payloads.
Classification
Scanner 95%
Target:
Next.js (versions < 14.1.1) and Waku
No auth needed
Prerequisites:
Access to the target application's codebase or live endpoint · Python 3.8+ environment
nomisec
WORKING POC
2 stars
by oscarmine · remote
https://github.com/oscarmine/R2SAE
This is a Firefox extension designed to detect and exploit CVE-2025-55182, a prototype pollution vulnerability in Next.js React Server Actions that leads to Remote Code Execution (RCE). The extension automates scanning, command execution, and bulk scanning of targets.
Classification
Working Poc 95%
Target:
Next.js applications using React Server Actions with multipart form data
No auth needed
Prerequisites:
Target must be a Next.js application with vulnerable React Server Actions · Attacker must be able to send crafted multipart form data to the target
nomisec
WORKING POC
2 stars
by dr4xp · remote
https://github.com/dr4xp/react2shell
This PoC exploits CVE-2025-55182, an unauthenticated RCE vulnerability in the react-server package used by React Server Components (RSC). It leverages prototype pollution and server-side JavaScript execution to achieve command injection via a crafted payload sent to the target endpoint.
Classification
Working Poc 95%
Target:
react-server (React Server Components)
No auth needed
Prerequisites:
Target must be running a vulnerable version of react-server or Next.js with RSC enabled · Network access to the target endpoint
nomisec
WORKING POC
2 stars
by C00LN3T · poc
https://github.com/C00LN3T/React2Shell
This repository contains a Python-based scanner and exploitation toolkit targeting React/Spring/GraphQL stacks, specifically designed to exploit CVE-2025-55182 and CVE-2025-66478. It includes payloads for command execution, WAF evasion techniques, and multi-mode CLI functionality for scanning and direct exploitation.
Classification
Working Poc 95%
Target:
React/Spring/GraphQL stacks
No auth needed
Prerequisites:
Python 3.8+ · requests library · urllib3 library
nomisec
SCANNER
2 stars
by Saturate · poc
https://github.com/Saturate/CVE-2025-55182-Scanner
This repository contains a scanner for CVE-2025-55182, a critical RCE vulnerability in React Server Components and Next.js. The scanner checks for the presence of the vulnerability by sending crafted payloads and analyzing HTTP responses.
Classification
Scanner 95%
Target:
React (19.0.0, 19.1.0, 19.1.1, 19.2.0), Next.js (>=14.3.0-canary.77, all 15.x and 16.x before patches)
No auth needed
Prerequisites:
Network access to the target application
nomisec
WORKING POC
2 stars
by Dh4v4l8 · remote
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
This repository contains a functional exploit PoC for CVE-2025-55182, targeting a critical RCE vulnerability in Next.js React Server Components. The script includes WAF bypass techniques and supports various customization options for testing.
Classification
Working Poc 90%
Target:
Next.js React Server Components
No auth needed
Prerequisites:
Vulnerable Next.js application · Network access to the target
nomisec
WORKING POC
2 stars
by ToritoIO · remote
https://github.com/ToritoIO/Torito-R2S
This repository contains a Python-based scanner and exploit tool for CVE-2025-55182, targeting Next.js React Server Components (RSC). It includes fingerprinting, safe probing, PoC confirmation via redirect-based side-channel, and optional RCE exploitation with command injection or interactive shell.
Classification
Working Poc 95%
Target:
Next.js with React Server Components (RSC)
No auth needed
Prerequisites:
Python 3.9+ · Target URLs or domains · Optional: Shodan API key for discovery · Optional: Subfinder for subdomain enumeration
nomisec
SCANNER
2 stars
by SainiONHacks · poc
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
This repository contains a GUI-based scanner tool designed to detect and demonstrate the React Server Components RCE vulnerability (CVE-2025-55182) in Next.js applications. It automates the exploitation process by constructing malicious payloads and analyzing server responses.
Classification
Scanner 90%
Target:
Next.js applications with React Server Components
No auth needed
Prerequisites:
Target URL running a vulnerable Next.js application · Network access to the target
nomisec
WORKING POC
2 stars
by ihhgimhana · remote
https://github.com/ihhgimhana/React2Shell-CVE-2025-55182-PoC-Reverse-Shell
This repository contains a Python-based exploit for CVE-2025-55182, targeting a Node.js Prototype Pollution vulnerability to achieve Remote Code Execution (RCE) via a reverse shell. The exploit leverages a crafted payload to trigger `execSync` and establish a Netcat reverse shell connection.
Classification
Working Poc 95%
Target:
Node.js applications vulnerable to Prototype Pollution (specific version not specified)
No auth needed
Prerequisites:
Python 3.x · requests library · Netcat listener · Target URL · Attacker IP and port
nomisec
SCANNER
2 stars
by CymulateResearch · poc
https://github.com/CymulateResearch/React2Shell-Scanner
This repository contains a non-intrusive vulnerability scanner for detecting CVE-2025-55182 and CVE-2025-66478 in React Server Components (RSC) implementations. It uses benign payloads to test for insecure deserialization vulnerabilities without executing malicious code.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
React (react-server-dom versions 19.0.0, 19.1.0, 19.1.1, 19.2.0) and Next.js (versions 14.3.0-canary, 15.x, 16.x with App Router)
No auth needed
Prerequisites:
Target must be running a vulnerable version of React or Next.js with RSC enabled
nomisec
WORKING POC
2 stars
by MuhammadWaseem29 · remote
https://github.com/MuhammadWaseem29/React2Shell_Rce-cve-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, demonstrating an RCE vulnerability in React Server Components due to unsafe deserialization of attacker-controlled payloads. The PoC includes HTTP requests that trigger arbitrary command execution via crafted multipart form data.
Classification
Working Poc 95%
Target:
React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Access to a vulnerable React Server Components endpoint · Ability to send crafted HTTP requests
nomisec
WORKING POC
2 stars
by zamdevio · poc
https://github.com/zamdevio/r2s
This repository contains a functional PoC tool (React2Shell) for testing CVE-2025-55182, a critical RCE vulnerability in Next.js Server Actions. The tool includes vulnerability detection, interactive shell, file operations, and system information gathering capabilities.
Classification
Working Poc 95%
Target:
Next.js (versions affected by CVE-2025-55182, e.g., 16.0.5)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application with exposed Server Actions
nomisec
SCANNER
2 stars
by philparzer · poc
https://github.com/philparzer/nextjs-react2shell-detect
This repository contains a Chrome extension that detects vulnerable versions of Next.js by injecting a script to check `next.version` and alerting users if the site is vulnerable to CVE-2025-55182 (react2shell).
Classification
Scanner 95%
Target:
Next.js (versions 15.0.0-15.0.4, 15.1.0-15.1.8, 15.2.0-15.2.5, 15.3.0-15.3.5, 15.4.0-15.4.7, 15.5.0-15.5.6, 16.0.0-16.0.6, and specific canary versions)
No auth needed
Prerequisites:
Chrome browser with extension installed · Access to a website running Next.js
nomisec
WORKING POC
2 stars
by cypholab · remote
https://github.com/cypholab/evilact
This repository contains a Go-based scanner and PoC for CVE-2025-55182, targeting RCE in Next.js applications using React Server Components. It supports bulk scanning, RCE confirmation via command execution, and concurrent checks.
Classification
Working Poc | Scanner 95%
Target:
Next.js with React Server Components
No auth needed
Prerequisites:
Target must be a vulnerable Next.js application with exposed RSC endpoints
nomisec
WRITEUP
2 stars
by logesh-GIT001 · poc
https://github.com/logesh-GIT001/CVE-2025-55182
This repository contains a detailed writeup for CVE-2025-55182, a critical unauthenticated RCE vulnerability in React Server Components. It describes the attack vector, affected versions, and mitigation steps but does not include functional exploit code.
Classification
Writeup 90%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0.0 to 19.2.0
No auth needed
Prerequisites:
Target server running vulnerable React Server Components · Network access to the target server
nomisec
WORKING POC
2 stars
by onlylovetx · poc
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
This is a Python-based exploit for CVE-2025-55182, targeting a vulnerability in Next.js applications. It includes both safe checks and RCE payloads, with options for WAF bypass and custom command execution.
Classification
Working Poc 90%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target must be a vulnerable Next.js application · Network access to the target
nomisec
WORKING POC
2 stars
by sudo-Yangziran · poc
https://github.com/sudo-Yangziran/CVE-2025-55182POC
This PoC demonstrates a remote code execution (RCE) vulnerability in React Server Components (RSC) via vm.runInThisContext. The exploit sends a malicious ACTION payload to trigger arbitrary command execution on the target server.
Classification
Working Poc 95%
Target:
React Server Components (RSC)
No auth needed
Prerequisites:
Target server running vulnerable React Server Components · Access to a POST endpoint that processes ACTION payloads
nomisec
STUB
1 stars
by Y3B3L4Y3 · poc
https://github.com/Y3B3L4Y3/CVE-2025-55182-test
The repository contains a basic Next.js/React setup but lacks any exploit code or technical details for CVE-2025-55182. It appears to be a placeholder or template project.
Target:
Next.js/React (version unspecified)
No auth needed
Prerequisites:
None specified
nomisec
WORKING POC
1 stars
by hexsh1dow · remote
https://github.com/hexsh1dow/CVE-2025-55182
This repository contains a functional Go-based exploit for CVE-2025-55182, targeting React Server Components (RSC) in React 19.0.0-19.2.0 and Next.js applications. The exploit provides an interactive shell for remote code execution (RCE) on vulnerable targets.
Classification
Working Poc 95%
Target:
React Server Components (RSC) in React 19.0.0-19.2.0 and Next.js applications
No auth needed
Prerequisites:
Go 1.18 or higher · Vulnerable target running React 19.0.0-19.2.0
gitlab
SUSPICIOUS
1 stars
by letchupkt · poc
https://gitlab.com/letchupkt/react2shell
The repository claims to provide an exploit for CVE-2025-55182 and CVE-2025-66478 but contains obfuscated code with no visible technical details about the vulnerabilities. The README focuses on features like 'integrity verification' and 'obfuscation' rather than explaining the actual exploit mechanics.
Classification
Suspicious 90%
Target:
React Server Functions and Next.js RSC
No auth needed
Prerequisites:
Python 3 · requests library · urllib3 library
nomisec
WORKING POC
1 stars
by snipevx · remote
https://github.com/snipevx/React2Shell-POC
This PoC exploits CVE-2025-55182, a prototype pollution vulnerability in React applications leading to remote code execution (RCE). It crafts a malicious multipart form-data request to inject and execute arbitrary commands via Node.js's child_process module.
Classification
Working Poc 95%
Target:
React applications with vulnerable server-side rendering (SSR) or API routes
No auth needed
Prerequisites:
Target application must be vulnerable to prototype pollution · Server-side JavaScript execution context (e.g., Next.js API routes)
nomisec
WORKING POC
1 stars
by George0Papasotiriou · remote
https://github.com/George0Papasotiriou/CVE-2025-55182-React2Shell-CVSS-10.0-
This repository contains a Python and Bash PoC for CVE-2025-55182, exploiting a prototype pollution vulnerability in React Server Components to achieve pre-authentication RCE via insecure deserialization.
Classification
Working Poc 90%
Target:
React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Network access to the target server · React Server Components vulnerable version
nomisec
WORKING POC
1 stars
by BrianLopezM99 · remote
https://github.com/BrianLopezM99/react2shell-CVE-2025-55182
This is a functional Python exploit for CVE-2025-55182, targeting a Next.js React Server Components RCE vulnerability via prototype pollution and command injection. It uses raw sockets with SSL/TLS support to send a crafted multipart/form-data payload.
Classification
Working Poc 95%
Target:
Next.js React Server Components
No auth needed
Prerequisites:
Target URL with vulnerable Next.js application · Network access to the target
nomisec
SCANNER
1 stars
by rapticore · remote
https://github.com/rapticore/ore_react2shell_scanner
This repository contains a scanner toolkit for detecting CVE-2025-55182 (React2Shell), a critical RCE vulnerability in React Server Components. It includes tools for endpoint scanning, subdomain enumeration, and vulnerability verification.
Classification
Scanner 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Python 3.8+ · aiohttp · jinja2 · subfinder (optional)
nomisec
WORKING POC
1 stars
by Sairbo · poc
https://github.com/Sairbo/Unihackers---CVE-2025-55182-
This repository provides a functional PoC for CVE-2025-55182, a pre-authentication RCE vulnerability in React Server Components and Next.js. It includes a Dockerized vulnerable environment and an HTTP payload to exploit unsafe deserialization in Server Function endpoints.
Classification
Working Poc 95%
Target:
Next.js 16.0.6 with React 19.2.0
No auth needed
Prerequisites:
Docker · vulnerable Next.js/React versions
nomisec
WORKING POC
1 stars
by clevernyyyy · poc
https://github.com/clevernyyyy/CVE-2025-55182-Dockerized
This repository contains a dockerized proof of concept for CVE-2025-55182, a critical remote code execution vulnerability in React Server Components (RSC) affecting Next.js applications using Server Actions. The exploit leverages prototype pollution and deserialization flaws to achieve RCE.
Classification
Working Poc 95%
Target:
Next.js 16.0.6
No auth needed
Prerequisites:
Docker installed and running · Python 3 with requests library
nomisec
WORKING POC
1 stars
by vonuyvicoo · infoleak
https://github.com/vonuyvicoo/nextploiter
This repository contains a CLI tool named 'nextploiter' designed to exploit vulnerabilities in NextJS applications, specifically targeting CVE-2025-55182. The tool provides various RCE (Remote Code Execution) commands such as file access, environment listing, and terminal spawning.
Classification
Working Poc 90%
Target:
NextJS
No auth needed
Prerequisites:
Access to a vulnerable NextJS application
nomisec
SCANNER
1 stars
by fevra-dev · poc
https://github.com/fevra-dev/GitExpose
GitExpose is a security scanner designed to detect various vulnerabilities, including CVE-2025-55182 (React2Shell), but does not contain functional exploit code. It includes modules for scanning exposed files, framework vulnerabilities, ML supply chain risks, and AI infrastructure exposures.
Classification
Scanner 95%
Target:
Multiple (React Server Components, ML models, AI infrastructure, etc.)
No auth needed
Prerequisites:
network access to target · Python 3.9+
nomisec
WORKING POC
1 stars
by xiaoLvChen · remote
https://github.com/xiaoLvChen/CVE-2025-55182
This repository contains a proof-of-concept exploit and scanner for CVE-2025-55182, targeting a vulnerability in Next.js and React Server Components (RSC). The exploit demonstrates remote code execution (RCE) via a crafted multipart POST request, with additional features for WAF bypass and Windows compatibility.
Classification
Working Poc | Scanner 95%
Target:
Next.js (15.x, 16.x with App Router), React Core (19.0.0 to 19.2.0), Node.js (20.9.0 LTS and above)
No auth needed
Prerequisites:
Target running vulnerable versions of Next.js, React, and Node.js · Network access to the target application
nomisec
WORKING POC
1 stars
by m3ngx1ng · poc
https://github.com/m3ngx1ng/CVE-2025-55182-GUI
This repository provides a GUI-based tool for detecting and exploiting CVE-2025-55182, a remote command execution vulnerability in Next.js React Server Components (RSC) via malicious multipart/form-data requests. The tool includes features for vulnerability detection, command execution, memory shell deployment, and reverse shell functionality.
Classification
Working Poc 90%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Target running vulnerable Next.js version · Network access to the target
nomisec
WORKING POC
1 stars
by rahuulmiishra · poc
https://github.com/rahuulmiishra/react2shell-CVE-2025-55182
This repository demonstrates a server-side code execution vulnerability in a Next.js application, where the `runServerCode` function in `serverCode.js` executes arbitrary commands via `execSync`. The README suggests modifying the payload to exploit the vulnerability.
Classification
Working Poc 80%
Target:
Next.js application (version unspecified)
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to send crafted requests
nomisec
SUSPICIOUS
1 stars
by captain4554 · poc
https://github.com/captain4554/captain4554.github.io
The repository lacks actual exploit code and instead directs users to external downloads via GitHub releases. It uses vague marketing language without technical details about CVE-2025-55182.
Classification
Suspicious 95%
Target:
Next.js and Waku applications
No auth needed
Prerequisites:
none specified
nomisec
SCANNER
1 stars
by j0lt-github · remote
https://github.com/j0lt-github/react2shell-burp
This is a Burp Suite extension designed to detect CVE-2025-55182, a pre-authentication RCE vulnerability in React Server Components due to unsafe deserialization. It includes passive fingerprinting and active scanning modes (safe digest check and PoC redirect) with optional Burp Collaborator integration.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
React Server Components (react-server-dom-webpack/turbopack/parcel versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Target must be running vulnerable React Server Components · Network access to the target
nomisec
WORKING POC
1 stars
by kanyokoo · remote
https://github.com/kanyokoo/React-Server-Components-Remote-Code-Execution-CVE-2025-55182-
This PoC exploits a prototype pollution vulnerability in React Server Components to achieve remote code execution via the 'child_process' module. It sends a crafted payload to exfiltrate '/secret.txt' to an attacker-controlled server.
Classification
Working Poc 95%
Target:
React Server Components (version not specified)
No auth needed
Prerequisites:
Target server running vulnerable React Server Components · Attacker-controlled server to receive exfiltrated data
nomisec
SCANNER
1 stars
by GarethMSheldon · poc
https://github.com/GarethMSheldon/React2Shell-CVE-2025-55182-Detector
This repository contains detection scripts for CVE-2025-55182, a deserialization flaw in React 19.x versions. The scripts check for vulnerable React versions in package.json files and do not include any exploit code.
Classification
Scanner 100%
Attack Type
Deserialization
Target:
React 19.0.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Access to the project root directory containing package.json · One of the following runtimes: Python, JavaScript, PowerShell, or Bash with jq installed
nomisec
WORKING POC
1 stars
by S3cr3t-SDN · remote
https://github.com/S3cr3t-SDN/React4Shell
This is a functional proof-of-concept exploit for CVE-2025-55182, targeting a deserialization vulnerability in React Server Components (RSC) and Next.js. The exploit crafts a malicious payload to achieve remote code execution via unsafe deserialization in Server Function endpoints.
Classification
Working Poc 95%
Target:
React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0) and Next.js
No auth needed
Prerequisites:
Target must be running a vulnerable version of React Server Components or Next.js · Network access to the target server
nomisec
WORKING POC
1 stars
by Machine-farmer · poc
https://github.com/Machine-farmer/PunchingBag-for-React2Shell
This repository is a deliberately vulnerable Next.js 15.1.6 application designed to demonstrate CVE-2025-55182 (React2Shell), a critical Remote Code Execution vulnerability in React Server Components. It includes multiple attack vectors, CTF challenges, and educational resources for security research.
Classification
Working Poc 95%
Target:
Next.js 15.1.6 with React Server Components
No auth needed
Prerequisites:
Docker · Git · Basic knowledge of React and Next.js
nomisec
WORKING POC
1 stars
by p3ta00 · remote
https://github.com/p3ta00/react2shell-poc
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical unauthenticated Remote Code Execution vulnerability in React Server Components. The exploit leverages prototype pollution in the Flight protocol deserializer to achieve arbitrary code execution on vulnerable Next.js applications.
Classification
Working Poc 95%
Target:
React (19.0.0 - 19.2.0), Next.js (14.3.0-canary.77 - 16.x)
No auth needed
Prerequisites:
Vulnerable version of React or Next.js · Network access to the target application
nomisec
WRITEUP
1 stars
by xxxTectationxxx · poc
https://github.com/xxxTectationxxx/React2Shell-CVE-Lab
This repository provides a Dockerized lab environment for CVE-2025-55182, a critical RCE vulnerability in React Server Components and Next.js 15. It includes setup instructions and references but no actual exploit code.
Classification
Writeup 100%
Target:
Next.js 15.x.x, React Server DOM (19.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Docker · Docker Compose
nomisec
WORKING POC
1 stars
by CerberusMrX · poc
https://github.com/CerberusMrX/Cerberus-React2Shell-Scanner-Exploit
This repository contains a comprehensive exploitation framework for CVE-2025-55182, targeting Next.js Server Actions RCE. It includes automated vulnerability detection, RCE, interactive shell, privilege escalation, and reverse shell capabilities.
Classification
Working Poc 95%
Target:
Next.js Server Actions
No auth needed
Prerequisites:
Access to a vulnerable Next.js application with Server Actions enabled
nomisec
WORKING POC
1 stars
by lamaper · remote
https://github.com/lamaper/CVE-2025-55182-Toolbox
This repository contains a functional exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in React Server Components/Next.js. The exploit supports command execution, outbound connectivity checks, reverse shell generation, and memory shell injection for persistence.
Classification
Working Poc 95%
Target:
React Server Components / Next.js
No auth needed
Prerequisites:
Target must be running a vulnerable version of React Server Components/Next.js · Network access to the target application
nomisec
WORKING POC
1 stars
by Nkwenti-Severian-Ndongtsop · remote
https://github.com/Nkwenti-Severian-Ndongtsop/POC_react2shell_CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in Next.js React Server Components to achieve remote code execution (RCE). The exploit supports both direct command execution and reverse shells, with a lab environment for testing.
Classification
Working Poc 95%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Target running vulnerable Next.js application · Network access to the target
nomisec
WORKING POC
1 stars
by ceh-aditya-raj · remote
https://github.com/ceh-aditya-raj/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting Next.js App Router applications using React Server Components (RSC) and Server Actions. The exploit achieves unauthenticated Remote Code Execution (RCE) by abusing prototype chain manipulation and UTF-16LE encoding to bypass WAFs.
Classification
Working Poc 95%
Target:
Next.js App Router (with React Server Components and Server Actions)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with App Router and Server Actions enabled · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
1 stars
by M4rgs · remote
https://github.com/M4rgs/CVE-2025-55182-React2Shell-Exploit
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical pre-authentication RCE vulnerability in React Server Components (RSC) Flight protocol due to insecure deserialization. The exploit leverages prototype pollution to achieve arbitrary command execution on vulnerable Next.js applications.
Classification
Working Poc 95%
Target:
Next.js (15.x, 16.x, 14.3.0-canary.77 and later) and React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Vulnerable Next.js or React Server Components version · Network access to the target application
nomisec
SCANNER
1 stars
by Security-Phoenix-demo · remote
https://github.com/Security-Phoenix-demo/react2shell-scanner-CVE-2025-55182
This repository contains a scanner and exploit tool for CVE-2025-55182, a critical RCE vulnerability in React Server Components and Next.js. It includes detection, exploitation, and IOC correlation capabilities.
Classification
Scanner 95%
Target:
React Server Components / Next.js (react-server-dom-webpack, react-server-dom-turbopack, react-server-dom-parcel)
No auth needed
Prerequisites:
Target running vulnerable versions of React Server Components or Next.js · Network access to the target application
nomisec
WORKING POC
1 stars
by l0n3m4n · poc
https://github.com/l0n3m4n/CVE-2025-55182-Waf
This repository contains a Python-based exploit for CVE-2025-55182, targeting a Next.js RCE vulnerability. It includes WAF bypass techniques, async scanning, and reverse shell capabilities for both Linux and Windows targets.
Classification
Working Poc 90%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Network access to the target Next.js application · Python environment with required dependencies
nomisec
WORKING POC
1 stars
by mivmi · poc
https://github.com/mivmi/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, targeting a Next.js application vulnerability that allows remote command execution via prototype pollution and server-side request forgery (SSRF). The exploit includes a FastAPI backend to test and execute commands on vulnerable targets.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Network connectivity to the target
nomisec
WORKING POC
1 stars
by LucasPDiniz · remote
https://github.com/LucasPDiniz/CVE-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, an insecure deserialization vulnerability in React Server components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) affecting Next.js versions 19.0 to 19.2.0. The exploit leverages crafted Flight protocol payloads to achieve unauthenticated remote code execution (RCE) via prototype pollution and insecure deserialization.
Classification
Working Poc 95%
Target:
Next.js (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Target running vulnerable Next.js version · Network access to the target application
nomisec
WORKING POC
1 stars
by VVVI5HNU · remote
https://github.com/VVVI5HNU/CVE-2025-55182
This is a functional exploit PoC for CVE-2025-55182, targeting a Next.js application vulnerability that allows remote command execution via prototype pollution and server-side request manipulation. The exploit supports both direct command execution and reverse shell payloads.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target URL · Network access to the vulnerable application
nomisec
WORKING POC
1 stars
by ProwlSec · remote
https://github.com/ProwlSec/React2Shell
This repository contains a functional exploit for CVE-2025-55182, targeting Next.js applications with React Server Components (RSC). The exploit leverages a crafted multipart/form-data request to achieve remote command execution (RCE) via prototype pollution and server-side JavaScript injection.
Classification
Working Poc 95%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Target must be a vulnerable Next.js application with exposed RSC endpoints
nomisec
WORKING POC
1 stars
by VolksRat71 · poc
https://github.com/VolksRat71/react2shellexploitvisualized
This repository is an interactive educational visualization explaining the React2Shell vulnerability (CVE-2025-55182), a critical remote code execution flaw in React Server Components. It includes a 5-step narrated walkthrough with animations, audio narration, and multi-audience support.
Classification
Working Poc 95%
Target:
React Server Components
No auth needed
Prerequisites:
A vulnerable React Server Components setup
nomisec
SCANNER
1 stars
by mounta11n · remote
https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
This repository contains a detection script for CVE-2025-55182 and CVE-2025-66478, which are RCE vulnerabilities in React Server Components (RSC) and Next.js. The script checks for specific signatures in server responses to determine vulnerability status.
Classification
Scanner 95%
Target:
React Server Components (RSC) and Next.js
No auth needed
Prerequisites:
Access to the target domain
nomisec
WORKING POC
1 stars
by gagaltotal · remote
https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting a React/Next.js RCE vulnerability. The PoC sends a crafted multipart/form-data request with a base64-encoded payload to execute arbitrary commands on the target system.
Classification
Working Poc 90%
Target:
React/Next.js (specific version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of React/Next.js · Network access to the target
nomisec
WORKING POC
1 stars
by raivenLockdown · remote
https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-
This is a functional Proof-of-Concept exploit for CVE-2025-55182, targeting a Prototype Pollution vulnerability in Next.js applications using React Server Components. It provides multiple modes for remote command execution, including an interactive web console and reverse shell capabilities.
Classification
Working Poc 95%
Target:
Next.js with React Server Components
No auth needed
Prerequisites:
Vulnerable Next.js application with React Server Components · Network access to the target server
nomisec
WORKING POC
1 stars
by andrei2308 · remote
https://github.com/andrei2308/react2shell
This is a functional exploit for CVE-2025-55182, targeting a React Server Components RCE vulnerability. It crafts a malicious payload to execute arbitrary commands via prototype pollution and deserialization.
Classification
Working Poc 95%
Target:
React Server Components (version not specified)
No auth needed
Prerequisites:
Node.js environment · Target URL with vulnerable React Server Components
nomisec
WORKING POC
1 stars
by IrsyadSEC · remote
https://github.com/IrsyadSEC/CVE-2025-55182-MassPayloadAttack
This repository contains a mass exploitation script for CVE-2025-55182, targeting Next.js applications. The script automates payload injection and command execution across multiple targets, parsing RCE output from Next.js error digests.
Classification
Working Poc 95%
Target:
Next.js applications
No auth needed
Prerequisites:
Linux environment · curl · openssl · grep · cut · list of target URLs
nomisec
WORKING POC
1 stars
by pkrasulia · remote
https://github.com/pkrasulia/CVE-2025-55182-NextJS-RCE-PoC
This repository contains a functional proof-of-concept for CVE-2025-55182, demonstrating an RCE vulnerability in Next.js via prototype pollution in React Server Components. The exploit leverages crafted multipart/form-data requests to execute arbitrary commands on the server.
Classification
Working Poc 95%
Target:
Next.js < 15.0.3, React < 19.0.0
No auth needed
Prerequisites:
Vulnerable Next.js/React versions · Network access to the target server
nomisec
WORKING POC
1 stars
by Yyax13 · remote
https://github.com/Yyax13/CVE-2025-55182
This repository contains a Go-based interactive RCE exploitation tool for CVE-2025-55182, targeting React Server Components in React 19.0.0-19.2.0 and Next.js applications. The tool provides a shell-like interface for executing commands on vulnerable targets.
Classification
Working Poc 95%
Target:
React Server Components (React 19.0.0-19.2.0, Next.js with affected React versions)
No auth needed
Prerequisites:
Vulnerable React/Next.js application · Network access to the target
nomisec
WORKING POC
1 stars
by Gymnott1 · remote
https://github.com/Gymnott1/CVE-2025-55182
This PoC demonstrates a deserialization vulnerability in Next.js 15.0.0 and React 19.2.0, where malicious input in a multipart/form-data request can lead to arbitrary code execution during deserialization. The exploit leverages a crafted payload to trigger command execution via the `_prefix` field.
Classification
Working Poc 90%
Target:
Next.js 15.0.0 with React 19.2.0
No auth needed
Prerequisites:
Next.js 15.0.0 and React 19.2.0 installed · Access to the target application's endpoint
nomisec
SCANNER
1 stars
by Saad-Ayady · remote
https://github.com/Saad-Ayady/react2shellNSE
The repository contains an Nmap NSE script for detecting potentially vulnerable React Server Components (RSC) and unsafe SSR endpoints. It performs safe, passive checks and non-exploitative POST probes to identify React Flight serialization markers and unsafe deserialization indicators.
Classification
Scanner 100%
Target:
React Server Components (RSC) and SSR endpoints
No auth needed
Prerequisites:
Nmap with NSE support · Network access to target HTTP ports
nomisec
SCANNER
1 stars
by JahazielLem · remote
https://github.com/JahazielLem/NSE_CVE-2025-55182
This is an Nmap NSE script designed to detect CVE-2025-55182 (React2Shell), a remote code execution vulnerability in React Server Components. It performs framework detection, constructs multipart payloads, and checks for exploitation signs like HTTP 500 errors or redirect digests.
Classification
Scanner 95%
Target:
React Server Components (Next.js)
No auth needed
Prerequisites:
Target running React Server Components or Next.js · Accessible HTTP endpoints
nomisec
WORKING POC
1 stars
by FurkanKAYAPINAR · poc
https://github.com/FurkanKAYAPINAR/ReactNext2Shell
This repository contains a scanner and exploit PoC for CVE-2025-55182, targeting a vulnerable Node.js API backend. The exploit leverages command injection via the `x-shell-cmd` header or `shell_cmd` body parameter in the `usersController.js` file.
Classification
Working Poc 90%
Target:
Node.js API backend with vulnerable usersController
No auth needed
Prerequisites:
Access to the vulnerable API endpoint · Ability to send crafted HTTP requests
nomisec
WORKING POC
1 stars
by theman001 · poc
https://github.com/theman001/CVE-2025-55182_PoC-Test-Server
This repository provides a test server setup for CVE-2025-55182, a React RCE vulnerability. It includes scripts to automate the deployment of a vulnerable Next.js 15 environment and tools to test the exploit.
Classification
Working Poc 90%
Target:
Next.js 15.1.0 with React 19.0.0
No auth needed
Prerequisites:
Node.js · npm · pm2 · Next.js 15.1.0 · React 19.0.0
nomisec
WORKING POC
1 stars
by sun977 · poc
https://github.com/sun977/CVE-2025-55182
This repository contains a proof-of-concept exploit for CVE-2025-55182, which targets a path parsing flaw in React Server Components, leading to RCE via prototype pollution and code injection. It includes an exploit script (`exp.py`) and a vulnerability scanner (`cve-2025-55182-check.sh`).
Classification
Working Poc 90%
Target:
Next.js (versions 14.0.0-14.5.6, 15.0.0-15.6.0-canary.9, 16.0.0-16.0.6, 19.0.0-19.2.0) and related ecosystem packages
No auth needed
Prerequisites:
Target running vulnerable Next.js or related packages · Network access to the target server
nomisec
WORKING POC
1 stars
by ihsansencan · poc
https://github.com/ihsansencan/React2Shell-CVE-2025-55182
This repository demonstrates a critical RCE vulnerability (CVE-2025-55182) in Next.js 15.0.0 with React Server Components, allowing remote code execution via the RSC protocol. The PoC includes a Dockerized environment and an interactive UI for exploit demonstration.
Classification
Working Poc 95%
Target:
Next.js 15.0.0 with React Server Components
No auth needed
Prerequisites:
Exposed Next.js application with vulnerable version
nomisec
WORKING POC
1 stars
by cyberleelawat · remote
https://github.com/cyberleelawat/CVE-2025-55182
This is a functional exploit for CVE-2025-55182, targeting React Server Components via prototype pollution in the React Flight Protocol deserialization process. It achieves RCE by polluting Object.prototype.then and leveraging the Function constructor to execute arbitrary commands.
Classification
Working Poc 95%
Target:
React Server Components (specific version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of React Server Components · Network access to the target
nomisec
SCANNER
1 stars
by keshavyaduvans · remote
https://github.com/keshavyaduvans/cve-2025-55182
This repository contains a scanner for CVE-2025-55182, which targets React Server Components for potential RCE. The script includes subdomain enumeration and HTTP probing but does not contain exploit code.
Classification
Scanner 90%
Target:
React Server Components
No auth needed
Prerequisites:
curl · subfinder (optional) · httpx (optional)
nomisec
WORKING POC
1 stars
by ilixm · remote
https://github.com/ilixm/PoC-RCE-CVE-2025-55182
This repository contains a functional exploit toolkit for CVE-2025-55182, targeting RCE in React Server Components (Next.js and Waku). It leverages prototype pollution and unsafe deserialization to execute arbitrary JavaScript on the server.
Classification
Working Poc 95%
Target:
Next.js (13.4.0-14.1.0), Waku (vulnerable versions)
No auth needed
Prerequisites:
Node.js >= 16.0.0 · Network access to vulnerable target
nomisec
WORKING POC
1 stars
by imbas007 · poc
https://github.com/imbas007/POC-CVE-2025-55182
This is a Python-based exploit for CVE-2025-55182, targeting a Next.js React Server Components RCE vulnerability. The script includes detection logic, payload generation, and an interactive shell for post-exploitation.
Classification
Working Poc 90%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with React Server Components · Network access to the target application
nomisec
SCANNER
1 stars
by ancs21 · poc
https://github.com/ancs21/react2shell-scanner-rust
This repository contains a Rust-based scanner for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js/RSC applications. It includes both safe side-channel detection and RCE PoC detection methods.
Classification
Scanner 95%
Target:
Next.js/RSC applications
No auth needed
Prerequisites:
Access to the target URL · Network connectivity to the target
nomisec
WORKING POC
1 stars
by vulncheck-oss · remote
https://github.com/vulncheck-oss/cve-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, targeting a vulnerability in Next.js (React2Shell). The exploit deploys an in-memory webshell, allowing remote command execution via HTTP requests to a randomized endpoint.
Classification
Working Poc 95%
Target:
Next.js (React2Shell)
No auth needed
Prerequisites:
Network access to the target Next.js application · Target application must be vulnerable to CVE-2025-55182
nomisec
SCANNER
1 stars
by Shield-Cyber · infoleak
https://github.com/Shield-Cyber/react2shell-scanner
This repository contains a non-invasive scanner for detecting CVE-2025-55182, a vulnerability in React Server Components (RSC) and Next.js that allows remote code execution via malformed multipart form data. The scanner uses side-channel detection methods to identify vulnerable systems without executing malicious payloads.
Classification
Scanner 100%
Target:
React Server Components (RSC) and Next.js
No auth needed
Prerequisites:
Target system running vulnerable version of Next.js or React Server Components · Network access to the target system
nomisec
WORKING POC
1 stars
by racall · remote
https://github.com/racall/cve-2025-55182-node
This repository contains a functional PoC exploit for CVE-2025-55182, a prototype pollution vulnerability in Next.js that leads to remote code execution (RCE). The exploit leverages crafted multipart/form-data requests to manipulate the prototype chain and execute arbitrary commands via the `child_process` module.
Classification
Working Poc 95%
Target:
Next.js (specific versions affected by CVE-2025-55182)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js · Target must have Server Actions enabled
nomisec
SCANNER
1 stars
by Benrich127N · poc
https://github.com/Benrich127N/react2shell_analyzer
This repository provides a Dart-based HTTP proxy analyzer designed to inspect and log traffic between a browser/PoC and a Next.js server, specifically targeting Server Actions and React Flight protocol patterns. It detects suspicious patterns like prototype pollution attempts and React Flight tokens but does not contain exploit code.
Classification
Scanner 90%
Target:
Next.js Server Actions
No auth needed
Prerequisites:
Dart environment · Access to Next.js server traffic
nomisec
SCANNER
1 stars
by cahyod · poc
https://github.com/cahyod/react2shell
This repository contains a vulnerability scanner for CVE-2025-55182, which checks for vulnerable React packages in local projects and remote URLs. It does not include exploit code but detects potential vulnerabilities in `react-server-dom-*` packages and React v19.x.x.
Classification
Scanner 100%
Target:
React projects using vulnerable packages (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack, react v19.x.x)
No auth needed
Prerequisites:
Access to local project files or remote URL for passive detection
nomisec
SCANNER
1 stars
by hamm0nz · poc
https://github.com/hamm0nz/react2shell-audit
This repository contains a Bash script designed to scan for vulnerable versions of Next.js and React Server DOM components affected by CVE-2025-55182 (React2Shell) and CVE-2025-66478. It recursively checks installed package versions in node_modules and flags vulnerable or outdated dependencies.
Classification
Scanner 100%
Target:
Next.js (14.x-16.x), React Server DOM (19.x)
No auth needed
Prerequisites:
Access to the target filesystem · Presence of node_modules directories
nomisec
WORKING POC
1 stars
by Archerkong · remote
https://github.com/Archerkong/CVE-2025-55182
This repository contains a Nuclei template for CVE-2025-55182, which exploits a prototype pollution vulnerability leading to remote code execution (RCE) via child_process.execSync. The PoC demonstrates command injection by executing 'id' and embedding the output in a redirect response.
Classification
Working Poc 90%
Target:
Node.js application (specific framework/version not specified)
No auth needed
Prerequisites:
Vulnerable Node.js application with exposed endpoint · Nuclei scanner
nomisec
SCANNER
1 stars
by arashiyans · remote
https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478
This repository contains a scanner for detecting CVE-2025-55182 and CVE-2025-66478, which are vulnerabilities in React Server Components (RSC) and Next.js. The scanner checks for the presence of these vulnerabilities by sending crafted multipart form data payloads and analyzing responses.
Classification
Scanner 90%
Target:
React Server Components (RSC) / Next.js
No auth needed
Prerequisites:
Target must be running a vulnerable version of React Server Components or Next.js · Network access to the target application
nomisec
SCANNER
1 stars
by rocklambros · poc
https://github.com/rocklambros/React2Shell_Hunter
This repository contains a detection toolkit for CVE-2025-55182 and CVE-2025-66478, focusing on identifying exploitation attempts of React Server Components RCE via prototype pollution. It includes AWS GuardDuty, WAF, and CloudTrail monitoring components.
Classification
Scanner 90%
Target:
React Server Components (React Flight protocol), Next.js
No auth needed
Prerequisites:
AWS environment with GuardDuty, CloudTrail, and WAF enabled · IAM permissions for security scanning
nomisec
WORKING POC
1 stars
by xkey8 · poc
https://github.com/xkey8/react2shell
This is a functional proof-of-concept exploit for CVE-2025-55182, an unauthenticated remote code execution vulnerability in Next.js. It leverages prototype pollution and server-side request forgery to execute arbitrary commands via a crafted multipart/form-data request.
Classification
Working Poc 95%
Target:
Next.js versions before 15.0.4, 15.1.8, 15.2.5, 15.3.5, 15.4.7, 15.5.6, 16.0.6, and 14.3.0-canary.77 and later releases
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js · Network access to the target server
nomisec
WORKING POC
1 stars
by UmmItKin · remote
https://github.com/UmmItKin/CVE-2025-55182-PoC
This is a functional PoC for CVE-2025-55182, exploiting a prototype pollution vulnerability in Next.js to achieve remote command execution. The exploit crafts a malicious payload to execute arbitrary commands via child_process.execSync.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target running vulnerable Next.js instance · Network access to the target
nomisec
SCANNER
1 stars
by DelvyGonzalez · poc
https://github.com/DelvyGonzalez/react2shell-security-toolkit
This repository contains a security toolkit for detecting CVE-2025-55182, a critical RCE vulnerability in React 19.x and Next.js 15.x/16.x. It scans project dependencies and provides remediation guidance.
Classification
Scanner 100%
Target:
React 19.x, Next.js 15.x/16.x
No auth needed
Prerequisites:
Access to the target project's package.json
nomisec
SCANNER
1 stars
by Qixinlee · remote
https://github.com/Qixinlee/CVE-2025-55182-Scanner
This repository contains a Python-based scanner for CVE-2025-55182, a Next.js RCE vulnerability. The tool checks for the presence of the vulnerability by sending crafted payloads and analyzing responses.
Classification
Scanner 95%
Target:
Next.js
No auth needed
Prerequisites:
Network access to the target Next.js application
nomisec
WORKING POC
1 stars
by sohaibeb · remote
https://github.com/sohaibeb/CVE-2025-55182
This is a functional exploit for CVE-2025-55182, targeting a React/Next.js Server Function RCE via Prototype Pollution. It includes multiple payload templates for command execution, reverse shells, and file uploads.
Classification
Working Poc 95%
Target:
React/Next.js Server Functions (version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of React/Next.js with exposed server functions
nomisec
SCANNER
1 stars
by alessiodos · remote
https://github.com/alessiodos/react2shell-scanner
This repository contains a Python-based scanner for detecting CVE-2025-55182 and CVE-2025-66478, which are RCE vulnerabilities in Next.js applications using React Server Components. The scanner sends crafted multipart POST requests to check for vulnerability via a deterministic math operation or safe side-channel detection.
Classification
Scanner 95%
Target:
Next.js with React Server Components
No auth needed
Prerequisites:
Target must be a Next.js application using React Server Components · Network access to the target application
nomisec
WORKING POC
1 stars
by fullhunt · poc
https://github.com/fullhunt/react2shell-test-server
This repository provides a test server to demonstrate CVE-2025-55182 (React2Shell), an unauthenticated RCE vulnerability in React Server Components' Flight protocol deserialization. It includes a vulnerable Next.js/React setup and server actions to showcase exploitation.
Classification
Working Poc 95%
Target:
React 19.0.0, Next.js 15.0.4
No auth needed
Prerequisites:
Vulnerable React/Next.js versions · Network access to the target server
nomisec
WRITEUP
1 stars
by greenheadHQ · poc
https://github.com/greenheadHQ/CVE-2025-55182
This repository provides a detailed technical analysis of CVE-2025-55182, focusing on the root cause in React Server Components' Flight protocol deserialization. It explains the attack chain, payload structure, and patch analysis with depth.
Classification
Writeup 100%
Target:
React Server Components (Next.js 15.0.4)
No auth needed
Prerequisites:
Access to a vulnerable Next.js server with Server Actions enabled
nomisec
WORKING POC
1 stars
by shren207 · remote
https://github.com/shren207/CVE-2025-55182
This repository contains a functional PoC for CVE-2025-55182, an unauthenticated RCE vulnerability in React Server Components affecting specific versions of React and Next.js. The exploit leverages prototype pollution and deserialization flaws in the Flight protocol to achieve remote code execution.
Classification
Working Poc 95%
Target:
React (react-server-dom-webpack/parcel/turbopack 19.0-19.2.0), Next.js (15.0.4-16.0.6)
No auth needed
Prerequisites:
Target running vulnerable version of React/Next.js · Network access to the target server
nomisec
WORKING POC
1 stars
by kindone09 · remote
https://github.com/kindone09/CVE-2025-55182
This repository contains a Python-based automated scanner for CVE-2025-55182, targeting Next.js 16.0.6. The PoC sends a crafted multipart request to exploit a vulnerability, likely involving prototype pollution or deserialization, to achieve remote code execution (RCE) via a payload that executes the 'whoami' command.
Classification
Working Poc 95%
Target:
Next.js 16.0.6
No auth needed
Prerequisites:
Target running Next.js 16.0.6 · List of target URLs in 'urls.txt'
nomisec
WORKING POC
1 stars
by subzer0x0 · poc
https://github.com/subzer0x0/React2Shell
This repository provides an intentionally vulnerable React.js application for CVE-2025-55182, designed for educational and research purposes. It includes Docker setup instructions and references an external PoC for exploitation.
Classification
Working Poc 90%
Target:
React.js application (version not specified)
No auth needed
Prerequisites:
Docker environment · Access to the vulnerable application
nomisec
WORKING POC
1 stars
by ceortiz33 · poc
https://github.com/ceortiz33/CVE-2025-55182
This Python script exploits CVE-2025-55182, a prototype pollution vulnerability in React applications, to achieve remote command execution (RCE). It crafts a malicious multipart/form-data payload to inject and execute arbitrary commands via Node.js's `child_process.execSync`.
Classification
Working Poc 95%
Target:
React applications using Next.js (tested on Next.js 16.0.6)
No auth needed
Prerequisites:
Vulnerable React/Next.js application exposed · Network access to the target
nomisec
WORKING POC
1 stars
by f0xyx · poc
https://github.com/f0xyx/CVE-2025-55182-Scanner
This is a functional scanner for CVE-2025-55182, a Next.js RSC deserialization vulnerability leading to RCE. It sends a crafted multipart payload to trigger prototype pollution and server-side JavaScript execution, extracting command output from the server's error response.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js · Target endpoint must process RSC streaming payloads
nomisec
WORKING POC
1 stars
by rl0x01 · remote
https://github.com/rl0x01/CVE-2025-55182_PoC
This repository contains a functional PoC for CVE-2025-55182, a critical RCE vulnerability in React Server Components via the Flight protocol. The exploit leverages prototype pollution and deserialization to achieve remote code execution on vulnerable Next.js/React applications.
Classification
Working Poc 95%
Target:
Next.js (14.3.0-canary.77 to 16.0.6) and React (19.0.0 to 19.2.0)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js/React · Target must have the Flight protocol endpoint exposed
nomisec
SCANNER
1 stars
by Atlantis02-sec · poc
https://github.com/Atlantis02-sec/Vulnerability-assessment
This repository provides an Nmap NSE script for detecting CVE-2025-55182, a vulnerability in React-based applications. The script scans for the presence of the vulnerability but does not include exploit code.
Classification
Scanner 90%
Target:
React-based applications (version not specified)
No auth needed
Prerequisites:
Nmap installed · NSE script copied to Nmap scripts directory
nomisec
WORKING POC
1 stars
by Rat5ak · poc
https://github.com/Rat5ak/CVE-2025-55182-React2Shell-RCE-POC
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, targeting an unsafe deserialization vulnerability in React Server Components (RSC) and Next.js App Router. The exploit leverages malformed RSC Flight payloads to achieve remote code execution via Server Functions.
Classification
Working Poc 95%
Target:
React Server Components (RSC) with vulnerable react-server-dom-* packages (19.0.0-19.2.0) and Next.js App Router (15.x-16.x pre-patch)
No auth needed
Prerequisites:
Vulnerable React/Next.js version · Exposed Server Function endpoint · Network access to target
nomisec
WRITEUP
1 stars
by Airis101 · poc
https://github.com/Airis101/CVE-2025-55182-analysis
This is a detailed analysis of CVE-2025-55182, a prototype pollution vulnerability in React Server Components leading to RCE. The writeup explains the root cause, exploitation steps, and mitigation strategies.
Classification
Writeup 90%
Target:
react-server-dom-webpack < 19.2.0, react-server-dom-turbopack < 19.2.0
No auth needed
Prerequisites:
Application using React Server Components · Ability to send crafted requests to the server
nomisec
WORKING POC
1 stars
by ABCFabian · poc
https://github.com/ABCFabian/React2Shell-CVE-2025-55182-Testing-Environment
This repository provides a containerized testing environment for CVE-2025-55182, a critical RCE vulnerability in React Server Components. It includes a vulnerable Next.js application, a Nuclei scanner template, and a curl-based exploit example.
Classification
Working Poc 95%
Target:
React Server Components in Next.js 15.x/16.x
No auth needed
Prerequisites:
Exposed Next.js application with vulnerable React Server Components
nomisec
WORKING POC
1 stars
by mingyisecurity-lab · poc
https://github.com/mingyisecurity-lab/CVE-2025-55182-TOOLS
This repository contains a Go-based tool and a realistic Next.js POC for CVE-2025-55182, demonstrating RCE via Server Actions in Next.js. It includes detection, path scanning, and two exploit methods targeting `vm#runInThisContext` and `$@ Chunk.prototype.then`.
Classification
Working Poc 95%
Target:
Next.js (Server Actions)
No auth needed
Prerequisites:
Access to a vulnerable Next.js endpoint · Server Actions enabled
nomisec
WORKING POC
1 stars
by emadshanab · remote
https://github.com/emadshanab/POC-for-CVE-2025-55182
This is a functional exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in React Server Components (Next.js) to achieve remote code execution. The PoC constructs a malicious payload that manipulates the Flight protocol deserialization to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Next.js (15.x, 16.x with App Router and Server Actions) and react-server-dom-webpack (19.0.0-19.2.0)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js or react-server-dom-webpack · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
1 stars
by ZemarKhos · poc
https://github.com/ZemarKhos/CVE-2025-55182-Exploit-PoC-Scanner
This repository contains a comprehensive exploit PoC for CVE-2025-55182, targeting React Server Components (RSC) and Next.js Server Actions. It includes multiple RCE gadgets, file operations, and OOB callback methods for vulnerability detection and exploitation.
Classification
Working Poc 95%
Target:
React < 19.2.0, Next.js < 15.0.5
No auth needed
Prerequisites:
Target must be running vulnerable versions of React or Next.js · Network access to the target
nomisec
WORKING POC
1 stars
by MedusaSH · poc
https://github.com/MedusaSH/POC-CVE-2025-55182
This PoC demonstrates a deserialization vulnerability in React Server Components' Flight Protocol, allowing arbitrary command execution via crafted payloads. The exploit simulates RCE and file system access without performing actual malicious actions.
Classification
Working Poc 90%
Target:
Next.js < 14.2.21, Next.js < 15.1.2, React < 19.2.1
No auth needed
Prerequisites:
Target running vulnerable Next.js/React version · Network access to the target
nomisec
WORKING POC
1 stars
by SoICT-BKSEC · poc
https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab
This repository provides a Docker-based lab environment for CVE-2025-55182, demonstrating a remote code execution (RCE) vulnerability via malicious form data manipulation in a Node.js server using react-server-dom-webpack. The exploit leverages the decodeAction function to execute arbitrary commands via child_process#execSync.
Classification
Working Poc 95%
Target:
Node.js server using react-server-dom-webpack
No auth needed
Prerequisites:
Docker environment · Node.js server running the vulnerable code
nomisec
WRITEUP
1 stars
by ivaavimusic · poc
https://github.com/ivaavimusic/React19-fix-vibecoders
This repository provides AI prompts to automatically fix critical React/Next.js vulnerabilities (CVE-2025-55182 & CVE-2025-66478) by updating dependencies. It does not contain exploit code but serves as a remediation guide.
Classification
Writeup 100%
Target:
React 19.0.0-19.2.0, Next.js 15.0.0-16.0.6
No auth needed
Prerequisites:
AI coding assistant access · vulnerable React/Next.js project
nomisec
SCANNER
1 stars
by oways · poc
https://github.com/oways/React2shell-CVE-2025-55182-checker
This repository contains a passive version detection tool for CVE-2025-55182, which targets vulnerable React Server Components and Next.js versions. The tool checks for version strings in various files and HTTP headers without exploiting the vulnerability.
Classification
Scanner 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-turbopack) versions 19.0.0-19.2.0, Next.js versions 15.0.0-15.0.4, 14.x, and 13.5+
No auth needed
Prerequisites:
Network access to the target application
nomisec
WORKING POC
1 stars
by Pa2sw0rd · poc
https://github.com/Pa2sw0rd/exploit-CVE-2025-55182-poc
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a prototype chain vulnerability in React Server Components (RSC) affecting [email protected]. The exploit demonstrates RCE via vm.runInThisContext and other gadgets like child_process and fs.
Classification
Working Poc 95%
Target:
react-server-dom-webpack < 19.2.0
No auth needed
Prerequisites:
Node.js environment with vulnerable react-server-dom-webpack version · Network access to the target server
nomisec
WORKING POC
1 stars
by kk12-30 · poc
https://github.com/kk12-30/CVE-2025-55182
This PoC demonstrates a remote code execution (RCE) vulnerability in an unspecified software via a maliciously crafted multipart/form-data POST request. The exploit leverages Node.js module injection through the `vm#runInThisContext` method to execute arbitrary commands.
Classification
Working Poc 90%
Target:
Unspecified (likely a Node.js-based application)
No auth needed
Prerequisites:
Access to the target's `/formaction` endpoint · Target application must be running a vulnerable Node.js environment
nomisec
WORKING POC
1 stars
by songsanggggg · poc
https://github.com/songsanggggg/CVE-2025-55182
This repository contains a working proof-of-concept for CVE-2025-55182, demonstrating a remote code execution (RCE) vulnerability in React Server Components via improper handling of server actions and module loading. The exploit leverages the `Module._load` function to access Node.js built-in modules like `child_process` for arbitrary command execution.
Classification
Working Poc 95%
Target:
React Server Components (Next.js with React 19.2.1 or earlier)
No auth needed
Prerequisites:
Access to a vulnerable React Server Components endpoint · Ability to send crafted POST requests with multipart form data
nomisec
WORKING POC
by devianntsec · poc
https://github.com/devianntsec/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components (React 19.0.0-19.2.0) due to unsafe deserialization and prototype pollution. The exploit includes multiple attack modules and an interactive shell.
Classification
Working Poc 95%
Target:
React Server Components (React 19.0.0-19.2.0) in Next.js applications
No auth needed
Prerequisites:
Node.js 18+ · Python 3.9+ · Vulnerable Next.js application
nomisec
WORKING POC
by joaoreis13 · poc
https://github.com/joaoreis13/flight-risk
This repository contains a functional exploit for CVE-2025-55182, a critical pre-authentication RCE vulnerability in React Server Components (RSC) due to unsafe deserialization in the Flight protocol. The exploit includes a CLI tool for authorized testing, supporting file reads, directory listings, and command execution. Additional tools for scanning GitHub/GCP environments and correlating logs are provided.
Classification
Working Poc 95%
Target:
React (19.0.0-19.2.0), Next.js (14.3.0-15.3.5, 16.0.0-16.0.7)
No auth needed
Prerequisites:
Target application using vulnerable React/Next.js versions with RSC enabled
github
WORKING POC
by enciphers-team · pythonpoc
https://github.com/enciphers-team/cve-exploits/tree/main/CVE-2025-55182.py
This PoC exploits a prototype pollution vulnerability in a Node.js application to achieve remote code execution (RCE) by injecting a malicious payload into the `_response._prefix` field, which executes arbitrary commands via `child_process.exec`.
Classification
Working Poc 95%
Target:
Node.js application (specific software not explicitly named)
No auth needed
Prerequisites:
Target URL · Accessible shell file URL
nomisec
WRITEUP
by Mohamedniane · poc
https://github.com/Mohamedniane/cve-2025-55182-analysis
This repository provides a detailed technical analysis of CVE-2025-55182, including CVSS scoring, OWASP Top 10 mapping, and remediation recommendations. It does not contain functional exploit code but offers in-depth research and methodology.
Classification
Writeup 95%
Target:
React-based web application
No auth needed
Prerequisites:
React-based web application with specific vulnerability
nomisec
WORKING POC
by opsecramdan · poc
https://github.com/opsecramdan/react2shell-cve-2025-55182
The repository contains a functional Python-based exploitation framework for CVE-2025-55182, targeting a Remote Code Execution (RCE) vulnerability in Next.js applications. The tool includes subdomain enumeration, vulnerability scanning, and an interactive shell for post-exploitation activities.
Classification
Working Poc 95%
Target:
Next.js
No auth needed
Prerequisites:
Python 3.x · requests library · dnspython library
nomisec
STUB
by DeDnY · remote
https://github.com/DeDnY/CVE-2025-55182-poc-panel
The repository contains only a Dockerfile with no exploit code or technical details. It sets up a Node.js environment but lacks any PoC or vulnerability-specific content.
Target:
unknown
No auth needed
Prerequisites:
none
nomisec
WRITEUP
by AbdullahMaqbool22 · poc
https://github.com/AbdullahMaqbool22/Explosive-As-Hell-MCS-Qualifer-Web-500
This is a detailed technical writeup of a CTF challenge involving CVE-2025-55182, a React Server Components RCE vulnerability, followed by SUID privilege escalation via Perl. It includes step-by-step exploitation details, attack chain analysis, and references.
Classification
Writeup 100%
Target:
React Server Components (RSC)
No auth needed
Prerequisites:
React Server Components endpoint · SUID binary (Perl)
nomisec
WORKING POC
by oscar-mine · poc
https://github.com/oscar-mine/R2SAE
This repository contains a Firefox extension that automates the detection and exploitation of CVE-2025-55182, a prototype pollution vulnerability in Next.js React Server Actions leading to RCE. The extension includes functional exploit logic in `background.js` and a user interface for scanning and executing commands.
Classification
Working Poc 95%
Target:
Next.js applications using React Server Actions with multipart form data
No auth needed
Prerequisites:
Target must be a Next.js application with vulnerable React Server Actions configuration
nomisec
WRITEUP
by RewantChaudhari · poc
https://github.com/RewantChaudhari/nextjs-rce-incident-response
This repository provides a detailed incident response report and technical breakdown of CVE-2025-55182, an unauthenticated RCE vulnerability in React Server Components (RSC) Flight protocol. It includes remediation steps, hardening checklists, and post-incident analysis but does not contain functional exploit code.
Classification
Writeup 95%
Attack Type
Deserialization
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Next.js application with RSC enabled
nomisec
STUB
by kaxm23 · poc
https://github.com/kaxm23/CVE-2025-55182-Auto-Scanner
The repository contains only Python virtual environment files and no actual exploit code or scanner logic for CVE-2025-55182. The provided files are standard virtual environment activation scripts and pip dependencies, with no evidence of exploit implementation.
Target:
unknown
No auth needed
nomisec
WORKING POC
by masterwok · poc
https://github.com/masterwok/PoC-CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, a pre-authentication remote code execution vulnerability in React Server Components. The exploit leverages unsafe deserialization in HTTP requests to Server Function endpoints, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Target running vulnerable React Server Components · Network access to the target
nomisec
WORKING POC
by masterwok · poc
https://github.com/masterwok/CVE-2025-55182-React2Shell-PoC
This repository contains a functional exploit for CVE-2025-55182, targeting React Server Components. The exploit leverages unsafe deserialization in HTTP requests to achieve remote code execution via crafted payloads.
Classification
Working Poc 95%
Target:
React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Target running vulnerable React Server Components · Network access to the target
nomisec
WRITEUP
by porsellaj · poc
https://github.com/porsellaj/cve-2025-55182-react2shell-analysis
This repository provides a technical analysis of CVE-2025-55182, detailing the vulnerability's root cause (unsafe deserialization) and attack flow. It includes mitigation strategies and references to security research sources.
Classification
Writeup 90%
Target:
React Server Components
No auth needed
Prerequisites:
crafted HTTP request
nomisec
SCANNER
by aliksir · poc
https://github.com/aliksir/nextjs-security-scanner
This repository contains a Bash script that scans Next.js projects for CVE-2025-55182 (React2Shell) and credential exposure. It checks for vulnerable versions of Next.js and React, detects Server Components usage, and scans for exposed credentials, SSH keys, and other security misconfigurations.
Classification
Scanner 100%
Target:
Next.js (15.0.0–15.0.4, 15.1.0–15.1.8, 15.2.0–15.2.5, 15.3.0–15.3.5, 15.4.0–15.4.7, 15.5.0–15.5.6, 15.6.0, 16.0.0–16.0.6) and React (19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Access to the target Next.js project directory
nomisec
WORKING POC
by hujiaozhuzhu · remote
https://github.com/hujiaozhuzhu/CVE-2025-55182_liyon
This repository contains a functional Python exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) due to unsafe JavaScript deserialization. It includes both single-target and batch scanning capabilities, along with interactive shell and reverse shell features.
Classification
Working Poc 95%
Target:
React Server Components (RSC) versions 18.x to 19.x
No auth needed
Prerequisites:
Target running vulnerable React Server Components · Network access to the target
nomisec
STUB
by amikanev · poc
https://github.com/amikanev/CVE-2025-55182-LAB
The repository contains a simulated vulnerable endpoint demonstrating a deserialization issue related to CVE-2025-55182 but lacks functional exploit code or real vulnerability details. It emulates behavior without actual exploitation.
Attack Type
Deserialization
Prerequisites:
Access to the vulnerable endpoint
nomisec
WORKING POC
by 0x0asif · remote
https://github.com/0x0asif/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting Next.js App Router RCE via crafted multipart/form-data payloads. The exploit includes detection logic for vulnerable architectures and executes arbitrary commands via prototype pollution and server-side JavaScript injection.
Classification
Working Poc 95%
Target:
Next.js (App Router)
No auth needed
Prerequisites:
Target must be running Next.js with App Router · Network access to the target
nomisec
WORKING POC
by l0lsec · remote
https://github.com/l0lsec/cve-2025-55182-lab
This repository provides a Docker-based intentionally vulnerable lab for CVE-2025-55182, a critical deserialization vulnerability in React Server Components (RSC) affecting Next.js 15.1.0 and React 19.2.0. It includes pre-configured exploit templates for Burp Suite to demonstrate remote code execution (RCE) via crafted multipart requests.
Classification
Working Poc 95%
Target:
Next.js 15.1.0 with React 19.2.0
No auth needed
Prerequisites:
Docker · Docker Compose v2 · Burp Suite (optional for testing)
nomisec
WORKING POC
by devianntsec · poc
https://github.com/devianntsec/CVE-2025-55182-React2Shell-Masters-Thesis
This repository contains a functional exploit for CVE-2025-55182, demonstrating unauthenticated RCE in React Server Components via deserialization and prototype pollution. It includes a Python-based exploit with multiple attack modules and detailed technical documentation.
Classification
Working Poc 95%
Target:
React Server Components (React 19.0.0 - 19.2.0)
No auth needed
Prerequisites:
Node.js 18+ · Python 3.9+ · Vulnerable Next.js application
nomisec
WORKING POC
by eagle-nett · poc
https://github.com/eagle-nett/React2Shell-PoC-CVE-2025-55182
This repository provides a functional proof-of-concept exploit for CVE-2025-55182, demonstrating an unsafe deserialization vulnerability in React Server Components (RSC) and Next.js. It includes a detailed HTTP payload that triggers remote code execution (RCE) via crafted multipart/form-data requests.
Classification
Working Poc 95%
Target:
React Server Components (RSC) and Next.js (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Docker for running the vulnerable environment · Python for the scanner tool
nomisec
WORKING POC
by nexxp90 · poc
https://github.com/nexxp90/CVE-2025-55182_RCE_Exploit
This repository contains a functional Python exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in a Next.js application. The exploit crafts a malicious POST request with a payload that leverages JavaScript prototype manipulation to achieve remote code execution (RCE) via child_process.execSync.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target URL list in a text file · Python environment with requests library
nomisec
WORKING POC
by monarchfish · poc
https://github.com/monarchfish/cve-2025-55182-poc
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical unauthenticated RCE vulnerability in React Server Components (RSC) affecting React 19.0.0-19.2.0 and Next.js 14.3.0-canary.77+. The exploit leverages deserialization of untrusted data via the Flight protocol to achieve remote code execution.
Classification
Working Poc 100%
Target:
React (19.0.0-19.2.0), Next.js (14.3.0-canary.77+)
No auth needed
Prerequisites:
Next.js application with Server Actions enabled · Access to a vulnerable endpoint
nomisec
WRITEUP
by orgito1015 · poc
https://github.com/orgito1015/CVE-2025-55182-Researching-process
This repository is a defensive cybersecurity research project focused on CVE-2025-55182, providing technical analysis, detection rules, mitigation strategies, and lab configurations. It does not contain exploit code but offers comprehensive documentation and monitoring workflows.
Classification
Writeup 95%
Target:
Not specified
No auth needed
Prerequisites:
None
nomisec
WORKING POC
by lutraat · poc
https://github.com/lutraat/CVE-2025-55182-React-RSC-Exploit
This repository contains a functional exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in React Server Components (RSC) that leads to remote code execution (RCE) via process.mainModule.require('child_process'). The exploit leverages a crafted multipart/form-data payload to trigger the vulnerability and exfiltrates output through the X-Action-Redirect header.
Classification
Working Poc 95%
Target:
React Server Components (unsafe versions)
No auth needed
Prerequisites:
Python 3 · requests library · target URL with vulnerable React Server Components
github
WORKING POC
by wnaspy · shellpoc
https://github.com/wnaspy/CVE-POC-WEAPON/tree/main/CVE-2025-55182.py
This PoC exploits a prototype pollution vulnerability in a Node.js application to achieve remote code execution (RCE) by injecting malicious payloads into the 'then' and '_response' fields of a crafted chunk, leveraging the 'child_process' module to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Node.js application (specific version not specified)
No auth needed
Prerequisites:
Target application must be running and accessible · Node.js environment with vulnerable dependencies
nomisec
WORKING POC
by luoqichen · poc
https://github.com/luoqichen/CVE-2025-55182-POC
This repository contains a functional exploit tool for CVE-2025-55182, targeting a Next.js RCE vulnerability. It includes features for scanning, command execution, Godzilla memory shell injection, and reverse shell capabilities.
Classification
Working Poc 95%
Target:
Next.js
No auth needed
Prerequisites:
Go 1.16 or higher · Git
nomisec
WORKING POC
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) due to unsafe deserialization. The PoC includes a Python script and detailed HTTP request examples demonstrating arbitrary command execution via crafted multipart/form-data payloads.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0.0–19.2.0
No auth needed
Prerequisites:
Vulnerable React Server Components endpoint · Network access to the target
nomisec
SCANNER
by InferiorAK · poc
https://github.com/InferiorAK/CVE-2025-55182-React2Shell-Async-Scanner
This repository contains an async scanner for CVE-2025-55182, which targets React Server-Actions prototype-pollution leading to RCE via execSync. The tool detects vulnerable versions of React and Next.js using multiple techniques, including HTTP headers, inline scripts, and Playwright for App Router sites.
Classification
Scanner 95%
Target:
React 19.0.x / 19.1.x / 19.2.x + Next.js 15.x / 16.x
No auth needed
Prerequisites:
Target must be running vulnerable versions of React or Next.js · Network access to the target
nomisec
WORKING POC
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) due to unsafe deserialization. The PoC includes a Python script and detailed HTTP request examples demonstrating command injection via crafted multipart/form-data payloads.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0.0–19.2.0
No auth needed
Prerequisites:
Vulnerable React Server Components endpoint · Network access to the target
nomisec
WORKING POC
by androidteacher · poc
https://github.com/androidteacher/REACT-CVE-2025-55182-Lab
This repository contains a functional CTF lab demonstrating CVE-2025-55182, a critical deserialization vulnerability in React Server Components Flight protocol. It includes a vulnerable Next.js application, detailed exploitation guides, and a solve script to achieve RCE via crafted payloads.
Classification
Working Poc 95%
Target:
Next.js 16 (React Server Components Flight protocol)
Auth required
Prerequisites:
Docker environment · basic knowledge of React Server Components · ability to craft Flight protocol payloads
nomisec
SCANNER
by MrMahile · poc
https://github.com/MrMahile/MassScanning-CVE-2025-55182
This repository contains a Docker-based orchestration system for scanning targets for indicators of CVE-2025-55182, a critical deserialization vulnerability in React Server Components. It does not include exploit code but provides a framework for detecting vulnerable endpoints.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0) and related server-dom packages
No auth needed
Prerequisites:
Docker and Docker Compose · Python 3.8+ · Target list in split/ directory
nomisec
WORKING POC
by unixskid · poc
https://github.com/unixskid/CVE-2025-55182-Interactive-mode
This repository contains a functional exploit for CVE-2025-55182, targeting a Remote Code Execution (RCE) vulnerability in React Server Components (RSC) and Next.js. The exploit leverages a prototype pollution technique to execute arbitrary commands via a crafted multipart/form-data request.
Classification
Working Poc 95%
Target:
React 19.x (RSC enabled), Next.js frameworks using RSC
No auth needed
Prerequisites:
Target must be running React 19.x or Next.js with RSC enabled · Network access to the target server
nomisec
WORKING POC
by revasec · remote
https://github.com/revasec/CVE-2025-55182-Interactive-mode
This repository contains a functional exploit for CVE-2025-55182, targeting a Remote Code Execution (RCE) vulnerability in React Server Components (RSC) and frameworks like Next.js. The exploit leverages a prototype pollution technique to execute arbitrary commands via crafted multipart/form-data requests.
Classification
Working Poc 95%
Target:
React 19.x (RSC enabled), Next.js (frameworks using RSC)
No auth needed
Prerequisites:
Target must be running React 19.x with RSC enabled or a vulnerable Next.js version · Network access to the target server
nomisec
SCANNER
by alptexans · poc
https://github.com/alptexans/RSC-Detect-CVE-2025-55182
This repository contains a Python-based scanner designed to detect React Server Components (RSC) and Next.js applications by analyzing HTTP responses for specific patterns in HTML content and headers. It does not exploit any vulnerability but identifies technology stack indicators.
Classification
Scanner 95%
Target:
React Server Components (RSC) and Next.js applications
No auth needed
Prerequisites:
Python 3.7+ · requests library
nomisec
WRITEUP
by Yusril-git · poc
https://github.com/Yusril-git/OWASP-Detection-Lab
This repository documents a detection lab for CVE-2025-55182, focusing on simulating and detecting Insecure Deserialization in Node.js/React applications using Wazuh SIEM/EDR. It includes setup instructions, payload generation, and custom detection rules for real-time IOC monitoring.
Classification
Writeup 90%
Attack Type
Deserialization
Target:
Node.js/React applications using node-serialize
No auth needed
Prerequisites:
Node.js environment · Wazuh SIEM/EDR setup · Base64 payload generation
nomisec
WRITEUP
by Yusril-git · poc
https://github.com/Yusril-git/React2Shell-Wazuh-Detection
This repository documents a detection lab for CVE-2025-55182 (React2Shell), focusing on insecure deserialization in Node.js/React applications. It includes simulation setup, log analysis, and Wazuh SIEM/EDR detection rules for real-time IOC monitoring.
Classification
Writeup 90%
Attack Type
Deserialization
Target:
Node.js/React applications using node-serialize
No auth needed
Prerequisites:
Node.js environment · Express framework · node-serialize library · Wazuh SIEM/EDR setup
nomisec
WORKING POC
by zaryouhashraf · remote
https://github.com/zaryouhashraf/CVE-2025-55182
The repository provides a functional exploit for CVE-2025-55182, demonstrating a Remote Code Execution (RCE) vulnerability in React Server Components (RSC) due to unsafe deserialization. It includes a detailed technical analysis, affected versions, and a working proof-of-concept exploit.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0.0 to 19.2.0
No auth needed
Prerequisites:
Vulnerable React Server Components version · Network access to the target server
gitlab
WORKING POC
by lowercasenumbers · poc
https://gitlab.com/lowercasenumbers/cve-2025-55182
This repository contains a functional exploit for CVE-2025-55182, a critical unauthenticated RCE vulnerability in React Server Components. The exploit leverages prototype pollution in the React Flight protocol's deserialization logic to achieve arbitrary code execution.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) and Next.js
No auth needed
Prerequisites:
Vulnerable version of React Server Components or Next.js · Network access to the target server
gitlab
SCANNER
by caovanthanh203 · poc
https://gitlab.com/caovanthanh203/react2shell-scanner-docker
This repository contains a scanner tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using React Server Components. It sends crafted multipart POST requests to test for RCE vulnerabilities and includes features like WAF bypass and safe-check mode.
Classification
Scanner 95%
Target:
Next.js applications using React Server Components
No auth needed
Prerequisites:
Target application must be running a vulnerable version of Next.js with React Server Components
gitlab
WORKING POC
by ThemeHackers · poc
https://gitlab.com/ThemeHackers/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in a React-based application. The exploit leverages multipart/form-data payloads to achieve remote code execution (RCE) via Node.js child_process execution.
Classification
Working Poc 95%
Target:
React-based applications (likely Next.js)
No auth needed
Prerequisites:
Target application vulnerable to prototype pollution · Network access to the target
nomisec
WORKING POC
by Asder10 · poc
https://github.com/Asder10/React2Shell
React2Shell is an exploitation framework targeting CVE-2025-55182, a prototype pollution vulnerability in React Flight Protocol deserialization, enabling Remote Code Execution (RCE) on vulnerable Next.js applications. The repository includes modules for scanning, exploitation, and payload generation.
Classification
Working Poc 80%
Target:
Next.js applications using React Flight Protocol
No auth needed
Prerequisites:
Vulnerable Next.js application · Network access to the target
nomisec
SCANNER
by captain4554 · poc
https://github.com/captain4554/CVE-2025-55182-Scanner
This repository contains a hybrid security scanner for detecting vulnerabilities in applications, specifically targeting CVE-2025-55182. It combines static and dynamic analysis to identify potential threats.
Classification
Scanner 90%
Target:
CV_Scanner_v2.8.zip and Waku applications
No auth needed
Prerequisites:
Access to the target application or project folder
nomisec
WORKING POC
by vick333-peniel · remote
https://github.com/vick333-peniel/ReactExploitGUI
ReactExploitGUI is a graphical tool designed to exploit CVE-2025-55182, offering features like vulnerability detection, command execution, memory payload injection, and reverse shell setup. The repository includes a build script for multi-platform packaging using PyInstaller.
Classification
Working Poc 80%
Target:
Unknown (CVE-2025-55182)
No auth needed
Prerequisites:
Python 3.10 or higher · PySide6, requests, cryptography, PyYAML
nomisec
SUSPICIOUS
by ahmed-dev-op · poc
https://github.com/ahmed-dev-op/CVE-2025-55182
The repository claims to be a Docker lab for CVE-2025-55182 but lacks actual exploit code or technical details. It repeatedly links to a ZIP file, which is unusual for a PoC and raises suspicion.
Classification
Suspicious 80%
Target:
unspecified
No auth needed
Prerequisites:
Docker
nomisec
WORKING POC
by iksanwkk · remote
https://github.com/iksanwkk/CVE-2025-55182-exp
This repository contains a Python-based exploit for CVE-2025-55182, targeting React Server Components (RSC) in Next.js and react-server-dom-webpack. The exploit leverages prototype pollution in Flight protocol deserialization to achieve remote code execution (RCE).
Classification
Working Poc 90%
Target:
Next.js (15.x, 16.x with App Router and Server Actions), react-server-dom-webpack (19.0.0 - 19.2.0)
No auth needed
Prerequisites:
Python 3.x · requests library · target application using vulnerable versions of Next.js or react-server-dom-webpack
nomisec
WORKING POC
by sobuj0007 · remote
https://github.com/sobuj0007/Nextjs_RCE_Exploit_Tool
This repository contains a Go-based exploit tool targeting CVE-2025-55182 and CVE-2025-66478, focusing on Next.js applications. The tool includes a GUI and supports various payload types, including encrypted and obfuscated payloads, to bypass security mechanisms.
Classification
Working Poc 85%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Network access to the target Next.js application · Vulnerable endpoint exposed
nomisec
SUSPICIOUS
by 9988700 · poc
https://github.com/9988700/CVE-2025-55182-POC-NEXTJS
The repository claims to be a PoC for CVE-2025-55182 targeting NextJS RCE but lacks actual exploit code, instead providing repetitive download links to a ZIP file. The README is overly generic and lacks technical details.
Classification
Suspicious 70%
Target:
NextJS (version unspecified)
No auth needed
Prerequisites:
none specified
nomisec
WORKING POC
by alyaapm · remote
https://github.com/alyaapm/CVE-2025-55182-shellinteractive
This repository contains a working proof-of-concept exploit for CVE-2025-55182, a vulnerability in React Server Components allowing unauthorized remote code execution via incorrect data handling in React Server Actions. The interactive shell provides command execution, vulnerability detection, and file transfer capabilities.
Classification
Working Poc 90%
Target:
React Server Components (specific version not specified)
No auth needed
Prerequisites:
Python 3.8 or higher · requests library · vulnerable React Server Components instance
nomisec
WORKING POC
by wiixx44 · poc
https://github.com/wiixx44/CVE-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, targeting a deserialization vulnerability in React Server Components. The exploit leverages a crafted FormData payload to achieve remote code execution (RCE) via arbitrary command execution on the server.
Classification
Working Poc 95%
Target:
React Server Components (specific version not specified)
No auth needed
Prerequisites:
Server running vulnerable React Server Components · Network access to the target server
nomisec
WORKING POC
by Mayca369 · remote
https://github.com/Mayca369/CVE-2025-55182
The repository contains a functional PoC for CVE-2025-55182, demonstrating a remote code execution (RCE) vulnerability in a Next.js application. The exploit leverages prototype pollution and server-side request forgery (SSRF) to execute arbitrary commands via a crafted payload.
Classification
Working Poc 90%
Target:
Next.js (version not explicitly specified, but likely a vulnerable version from 2025)
No auth needed
Prerequisites:
Target server running a vulnerable Next.js application · Network access to the target server
nomisec
SCANNER
by meneim99 · remote
https://github.com/meneim99/react2shell-scanner
The repository contains a scanner tool for detecting CVE-2025-55182 and CVE-2025-66478, which are remote code execution vulnerabilities in React Server Components (RSC) or Next.js. The scanner uses multipart form data payloads to check for vulnerabilities, including a Vercel WAF bypass technique.
Classification
Scanner 90%
Target:
React Server Components (RSC)/Next.js
No auth needed
Prerequisites:
Network access to the target application · Python environment with required dependencies
nomisec
SCANNER
by mayank729 · poc
https://github.com/mayank729/CVE-2025-55182-scanner
This repository contains a Python-based scanner for detecting exposed React Server Components (RSC) endpoints vulnerable to CVE-2025-55182. The tool performs non-intrusive scans and includes features like WAF bypass techniques and multipart payload generation.
Classification
Scanner 95%
Target:
React Server Components (RSC) endpoints
No auth needed
Prerequisites:
Target URL or list of URLs · Network access to the target
nomisec
WORKING POC
by Farhan9488 · remote
https://github.com/Farhan9488/CVE-2025-55182-research
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, demonstrating multiple RCE gadgets via prototype pollution and deserialization attacks. The exploit targets a Node.js application and includes various payloads for command execution and file operations.
Classification
Working Poc 90%
Target:
Node.js application (version not specified)
No auth needed
Prerequisites:
Network access to the target application · Target application running on port 3002
nomisec
WORKING POC
by phornnato · remote
https://github.com/phornnato/CVE-2025-55182
This is a functional exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in React Server Components. It achieves RCE by polluting Object.prototype.then and leveraging the Function constructor to execute arbitrary commands via spawnSync.
Classification
Working Poc 95%
Target:
React Server Components (specific version not specified)
No auth needed
Prerequisites:
Target must be running vulnerable React Server Components · Network access to the target
nomisec
WORKING POC
by slreaperking · poc
https://github.com/slreaperking/CVE-2025-55182-poc
This repository contains a working proof-of-concept exploit for CVE-2025-55182, targeting a pre-authentication Remote Code Execution (RCE) vulnerability in [email protected]. The exploit leverages a prototype pollution technique to achieve RCE via a crafted multipart/form-data payload.
Classification
Working Poc 95%
Prerequisites:
Target application using [email protected] · Exposed endpoint vulnerable to the prototype pollution attack
nomisec
WORKING POC
by Ghost121111 · poc
https://github.com/Ghost121111/Blackash-CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting unauthenticated RCE in Next.js/React via insecure deserialization. It includes both a reverse shell and command execution PoC.
Classification
Working Poc 95%
Target:
Next.js 14.3.0-canary.77 to 16.0.6, React 19.0.0 to 19.2.0
No auth needed
Prerequisites:
Target running vulnerable Next.js/React version · Network access to the target
nomisec
SCANNER
by H4R335HR · remote
https://github.com/H4R335HR/reactshell
This repository contains a passive scanner for CVE-2025-55182, designed to detect the React Server Components RCE vulnerability without executing any payloads. It includes features like error pattern fingerprinting, version detection, and endpoint discovery.
Classification
Scanner 95%
Target:
React Server Components (versions below 14.3.2 and 15.2.4)
No auth needed
Prerequisites:
Network access to the target application
nomisec
WORKING POC
by DeDnY · poc
https://github.com/DeDnY/CVE-2025-55182-in-docker
This repository contains a functional exploit PoC for CVE-2025-55182, demonstrating RCE in Next.js via Server Actions. It includes a Dockerized environment with vulnerable endpoints and an exploit script.
Classification
Working Poc 95%
Target:
Next.js 14.0.0
No auth needed
Prerequisites:
Network access to the vulnerable Next.js application
nomisec
SCANNER
by Wyl-cmd · remote
https://github.com/Wyl-cmd/CVE-2025-55182
This repository contains a Python script designed to scan multiple targets for CVE-2025-55182, a vulnerability involving prototype pollution and command injection in a Next.js application. The script uses multithreading to test multiple paths and checks for the presence of 'test123' in response headers to confirm vulnerability.
Classification
Scanner 90%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
List of target URLs or a JSON file containing target URLs · Network access to the target systems
nomisec
WRITEUP
by BIG02-bot · poc
https://github.com/BIG02-bot/React2Shell-CVE-2025-55182-An-lise-T-cnica
This repository provides a detailed technical analysis of CVE-2025-55182, a critical deserialization vulnerability in React Server Components (RSC) and Next.js, leading to unauthenticated remote code execution (RCE). It explains the root cause, affected versions, and defensive strategies without including actual exploit code.
Classification
Writeup 90%
Attack Type
Deserialization
Target:
React Server Components (RSC), Next.js, react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack
No auth needed
Prerequisites:
Target running vulnerable versions of React (19.0.0-19.2.0) or Next.js (≥14.3.0-canary.77, 15.x, 16.x pre-patch) · Network access to the target application
nomisec
WRITEUP
by woorifisa-service-dev-6th · remote
https://github.com/woorifisa-service-dev-6th/tech-seminar-React2Shell
This repository contains a detailed writeup and analysis of CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) due to a deserialization flaw in the Flight Protocol. The README provides an in-depth explanation of the attack mechanism, impact, and mitigation steps.
Classification
Writeup 90%
Target:
React Server Components (RSC) with Flight Protocol
No auth needed
Prerequisites:
Target application using React Server Components · Exposed Flight Protocol endpoint
nomisec
WORKING POC
by Evillm · remote
https://github.com/Evillm/CVE-2025-55182-PoC
This repository contains a functional proof-of-concept (PoC) for CVE-2025-55182, demonstrating a Remote Code Execution (RCE) vulnerability in a React-based application. The PoC includes a scanner that exploits a prototype pollution vulnerability to execute arbitrary commands via a crafted multipart/form-data payload.
Classification
Working Poc 95%
Target:
React-based application (specific version not specified)
No auth needed
Prerequisites:
Target application must be running a vulnerable version of the React-based software · Network access to the target application
nomisec
WORKING POC
by mooowu · remote
https://github.com/mooowu/cve-2025-55182-poc
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical deserialization vulnerability in React Server Components (React 19.x and Next.js 15.x). The exploit demonstrates pre-authentication RCE via crafted Flight protocol payloads.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0 - 19.2.0), Next.js (15.0.0 - 16.0.7)
No auth needed
Prerequisites:
Docker for lab environment · Python 3.x for exploit execution
nomisec
WORKING POC
by 0xsj · remote
https://github.com/0xsj/CVE-2025-55182
This repository contains a Go-based scanner and interactive shell for CVE-2025-55182, a critical unauthenticated RCE vulnerability in React Server Components (RSC) affecting React 19.x and Next.js applications. The tool supports single/batch scanning, report generation, and shell access on vulnerable targets.
Classification
Working Poc | Scanner 95%
Target:
React Server Components (react-server-dom 19.0.x-19.2.x, Next.js 14.3.0-canary.77+)
No auth needed
Prerequisites:
Network access to target · Target running vulnerable React/Next.js version
nomisec
WORKING POC
by wnaspy · remote
https://github.com/wnaspy/CVE-2025-55182
This exploit leverages a prototype pollution vulnerability in a React-based application to achieve remote code execution (RCE) via Node.js child_process. It crafts a malicious payload to execute arbitrary commands through the 'Next-Action' endpoint.
Classification
Working Poc 95%
Target:
React-based application with vulnerable Next.js endpoint (version unspecified)
No auth needed
Prerequisites:
Target application running with Node.js · Access to the vulnerable endpoint
nomisec
STUB
by deepankarkumar1 · poc
https://github.com/deepankarkumar1/CVE-2025-55182_Vulnerable-Application
The repository contains compiled Next.js server files but lacks any exploit code or proof-of-concept for CVE-2025-55182. The files are standard Next.js build artifacts and do not demonstrate vulnerability exploitation.
Target:
Next.js (version unspecified)
No auth needed
Prerequisites:
None identified
nomisec
WORKING POC
by BBD-YZZ · poc
https://github.com/BBD-YZZ/CVE-2025-55182
This repository contains a proof-of-concept exploit for CVE-2025-55182, a remote code execution vulnerability in React Server Components and Next.js. The exploit leverages a flaw in the Server Actions functionality to execute arbitrary commands via crafted form data.
Classification
Working Poc 90%
Target:
React (19.0.0-19.2.0), Next.js (14.3.0-canary.77 to 16.0.7), Dify (1.1.2 to 1.10.1-fix.1)
No auth needed
Prerequisites:
Access to a vulnerable React/Next.js server · Ability to send crafted HTTP requests
nomisec
WORKING POC
by Namsom007 · poc
https://github.com/Namsom007/CVE-2025-55182-Exploit
This repository contains a functional proof-of-concept for CVE-2025-55182, demonstrating a command injection vulnerability in a Next.js application due to unsanitized user input passed to a child process. The exploit allows arbitrary command execution via the `ping` command.
Classification
Working Poc 100%
Target:
Next.js application with vulnerable child process handling
No auth needed
Prerequisites:
Docker and Docker Compose for setup · Network access to the vulnerable application
nomisec
STUB
by Vladjrfhfg · poc
https://github.com/Vladjrfhfg/React-site-CVE-2025-55182
The repository contains compiled Next.js server files but lacks executable exploit code or clear proof-of-concept details for CVE-2025-55182. The files appear to be standard build artifacts without offensive techniques.
Target:
Next.js (version unspecified)
No auth needed
Prerequisites:
None identified
nomisec
WORKING POC
by termireum · poc
https://github.com/termireum/react2shell
This Go-based tool scans for Server-Side Remote Code Execution (RCE) vulnerabilities in Next.js applications (CVE-2025-55182 & CVE-2025-66478). It leverages concurrency for high-performance scanning and integrates Subfinder for subdomain enumeration.
Classification
Working Poc 95%
Target:
Next.js applications
No auth needed
Prerequisites:
Go 1.19 or higher · Subfinder (optional for subdomain enumeration)
nomisec
STUB
by garux-sec · poc
https://github.com/garux-sec/PoC-react2shell-CVE-2025-55182
The repository contains only a README.md with minimal content, providing no technical details, exploit code, or proof-of-concept for CVE-2025-55182. It lacks any actionable information or code to assess functionality.
Target:
unknown
No auth needed
nomisec
WORKING POC
by Least-Significant-Bit · remote
https://github.com/Least-Significant-Bit/CVE-2025-55182
This is a functional proof-of-concept exploit for CVE-2025-55182, which achieves remote code execution (RCE) via a prototype pollution attack in a Node.js environment. The exploit emulates a shell by sending crafted HTTP POST requests with malicious payloads that execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Node.js application (specific framework/version not explicitly stated)
No auth needed
Prerequisites:
Target must be running a vulnerable Node.js application · Network access to the target's HTTP/HTTPS endpoint
nomisec
SUSPICIOUS
by Asder10 · poc
https://github.com/Asder10/asder10.github.io
The repository lacks actual exploit code and instead directs users to download an external tool via GitHub releases. The README is marketing-focused with no technical details about CVE-2025-55182.
Classification
Suspicious 95%
Target:
Next.js and React applications
No auth needed
Prerequisites:
none specified
nomisec
WORKING POC
by itumo-arigatone · poc
https://github.com/itumo-arigatone/study-CVE-2025-55182
This repository contains a functional PoC for CVE-2025-55182, a critical pre-authentication RCE vulnerability in React Server Components (versions 19.0.0-19.2.2). The exploit leverages prototype pollution and constructor chain manipulation to achieve remote code execution via deserialization of untrusted data in the React Flight protocol.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0-19.2.2)
No auth needed
Prerequisites:
Network access to vulnerable React Server Components application · Python environment for PoC execution
nomisec
STUB
by en0f · poc
https://github.com/en0f/CVE-2025-55182-poc-json
The repository contains only a README.md file with minimal content, providing no functional exploit code or technical details about CVE-2025-55182.
Target:
unknown
No auth needed
nomisec
WORKING POC
by shibaaa204 · remote
https://github.com/shibaaa204/React2Shell
This PoC exploits a prototype pollution vulnerability in a Next.js application to achieve remote code execution (RCE) via a malicious multipart form-data request. The payload triggers a reverse shell to the attacker's specified IP and port.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target server running vulnerable Next.js application · Network connectivity to the target · Attacker-controlled listener for reverse shell
nomisec
WRITEUP
by yannisduvignau · poc
https://github.com/yannisduvignau/react2shell-exploit
This repository provides a detailed technical analysis of CVE-2025-55182, a critical RCE vulnerability in Next.js applications using React Server Components and Server Actions. It includes a step-by-step exploitation guide, payload construction, and mitigation recommendations.
Classification
Writeup 95%
Target:
Next.js (React Server Components / Server Actions)
No auth needed
Prerequisites:
Next.js application with React Server Components or Server Actions enabled · Node.js 20 environment
nomisec
WORKING POC
by MyCompanyOrganization · remote
https://github.com/MyCompanyOrganization/React2Shell-Kingdom
This repository demonstrates CVE-2025-55182 (React2Shell), a critical RCE vulnerability in React Server Components 19.1.1. The exploit leverages unsafe deserialization in the RSC Flight protocol to execute arbitrary JavaScript, bypass authentication, and create new user entries.
Classification
Working Poc 95%
Target:
React Server Components 19.1.1 (react-server-dom-webpack)
No auth needed
Prerequisites:
Node.js 18+ · React Server Components 19.1.1 · Access to the RSC Flight protocol endpoint
nomisec
SUSPICIOUS
by gahoole77 · poc
https://github.com/gahoole77/gahoole77.github.io
The repository claims to provide a tool for scanning vulnerable Next.js instances but lacks actual exploit code, instead directing users to external downloads. The README is marketing-focused with no technical details about CVE-2025-55182.
Classification
Suspicious 95%
Target:
Next.js
No auth needed
nomisec
WORKING POC
by joaovicdev · remote
https://github.com/joaovicdev/EXPLOIT-CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components (React 19.x) caused by unsafe deserialization of FormData leading to prototype pollution and arbitrary command execution via `child_process.execSync`.
Classification
Working Poc 95%
Target:
React Server Components (React 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Target running vulnerable React Server Components · Network access to the target application
nomisec
WORKING POC
by jensnesten · poc
https://github.com/jensnesten/React2Shell-PoC
This repository contains a functional proof-of-concept exploit for CVE-2025-55182 and CVE-2025-66478, targeting Remote Code Execution (RCE) vulnerabilities in React Server Components (RSC) and Next.js applications via unsafe deserialization in server action handlers. The exploit leverages prototype pollution and crafted multipart form-data payloads to achieve command execution.
Classification
Working Poc 95%
Target:
Next.js and React Server Components (RSC)
No auth needed
Prerequisites:
Vulnerable Next.js or RSC application with exposed server action handlers
nomisec
SCANNER
by hyan0116 · remote
https://github.com/hyan0116/Next.js-RCE-CVE-2025-55182
This repository contains a Go-based GUI tool for assessing Next.js applications against CVE-2025-55182, focusing on security testing and vulnerability identification. It includes features like proxy support, SSL verification, and safeguards against testing unauthorized domains.
Classification
Scanner 90%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Go 1.24 or higher · Fyne dependencies · Internet connection
nomisec
WORKING POC
by dbwlsdnr95 · poc
https://github.com/dbwlsdnr95/CVE-2025-55182
This repository contains a functional PoC for CVE-2025-55182, demonstrating RCE and DoS vulnerabilities in Next.js 15.0.0 via Flight Protocol deserialization flaws. It includes realistic attack simulations for RCE, source code leakage, and recursive deserialization DoS.
Classification
Working Poc 95%
Attack Type
Rce | Dos | Info Leak
Target:
Next.js 15.0.0 (React 19 Server Components)
No auth needed
Prerequisites:
Network access to vulnerable Next.js server · Ability to send crafted HTTP requests
nomisec
WORKING POC
by Ya0h4cker · remote
https://github.com/Ya0h4cker/CVE-2025-55182
This PoC exploits a prototype pollution vulnerability in a Node.js application to achieve remote code execution (RCE) by injecting malicious payloads into the `__proto__` chain, ultimately executing arbitrary commands via `child_process.execSync`.
Classification
Working Poc 90%
Target:
Node.js application (version unspecified)
No auth needed
Prerequisites:
Target application running on localhost:3000 · Node.js environment with vulnerable dependencies
nomisec
WORKING POC
by HackIndex-io · poc
https://github.com/HackIndex-io/React2Shell-CVE-2025-55182
This repository provides a Docker-based sandbox environment for exploiting CVE-2025-55182, a vulnerability in a React-based application. It includes a web app and SSH server for testing, along with mitigation steps.
Classification
Working Poc 90%
Target:
React-based application (version not specified)
Auth required
Prerequisites:
Docker environment · Network access to the target · Valid credentials for SSH access
nomisec
SCANNER
by ghostn4444 · poc
https://github.com/ghostn4444/CVE-2025-55182
This repository contains a scanner tool for CVE-2025-66478, a critical RCE vulnerability in Next.js applications using React Server Components (RSC). The tool includes features for detection, exploitation, and WAF bypass.
Classification
Scanner 90%
Target:
Next.js with React Server Components (RSC)
No auth needed
Prerequisites:
Python 3.8+ · Target running vulnerable Next.js with RSC
nomisec
WORKING POC
by Goultarde · poc
https://github.com/Goultarde/CVE-2025-55182-React2Shell-Lab
This repository contains a functional PoC for CVE-2025-55182, a pre-authentication RCE vulnerability in React Server Components (versions 19.0.0-19.2.0) and Next.js (16.0.6). The exploit leverages unsafe deserialization in HTTP request payloads to achieve command execution.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0-19.2.0) and Next.js (16.0.6)
No auth needed
Prerequisites:
Target running vulnerable React/Next.js versions · Network access to the target
nomisec
SUSPICIOUS
by vick333-peniel · poc
https://github.com/vick333-peniel/vick333-peniel.github.io
The repository lacks actual exploit code and instead directs users to external downloads via GitHub releases. The README is marketing-focused with no technical details about CVE-2025-55182.
Classification
Suspicious 90%
Target:
unspecified
No auth needed
nomisec
SCANNER
by hndko · poc
https://github.com/hndko/react2shell-rce-autobot
This repository contains a Python-based scanner for detecting vulnerable Next.js and React applications affected by CVE-2025-55182 and CVE-2025-66478. It uses Google dorking to identify potential targets and performs safe side-channel detection to verify vulnerabilities without active exploitation.
Classification
Scanner 95%
Target:
Next.js (15.0.0-15.0.4, 16.0.0-16.0.6), React Server Components (19.0.0-19.2.0)
No auth needed
Prerequisites:
Python 3.8+ · BeautifulSoup · Google search access · Internet connectivity
nomisec
WORKING POC
by git0xLai · remote
https://github.com/git0xLai/React2ShellPoC
CVE-2025-55182 (React2Shell) is a critical RCE vulnerability in React Server Components due to unsafe deserialization in the Flight protocol. The PoC demonstrates prototype pollution to execute arbitrary code via a crafted multipart payload.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Vulnerable React Server Components environment · Network access to the target server
nomisec
WORKING POC
by ogpourya · remote
https://github.com/ogpourya/CVE-2025-55182
This repository contains a functional PoC for CVE-2025-55182, a Next.js RSC remote code execution vulnerability. The exploit leverages prototype pollution and deserialization to achieve RCE via crafted multipart form data.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with RSC enabled
nomisec
WORKING POC
by MeGaNeKoS · remote
https://github.com/MeGaNeKoS/secure-by-default-rce-demo
This repository demonstrates a working PoC for CVE-2025-55182, an RCE vulnerability in Next.js Server Actions via insecure deserialization. It includes exploits for both 'Living off the Land' and 'Bring Your Own Land' attack vectors, contrasting their effectiveness against unsafe and hardened deployments.
Classification
Working Poc 95%
Target:
Next.js with React Server Components (RSC)
No auth needed
Prerequisites:
Network access to the vulnerable Next.js application · Ability to send crafted requests to Server Actions
nomisec
WORKING POC
by amirali-ramezani · remote
https://github.com/amirali-ramezani/react2shell-CVE-2025-55182-
This PoC exploits a prototype pollution vulnerability in a React-based application to achieve remote command execution via DNS exfiltration. It sends a malicious multipart/form-data payload to trigger arbitrary command execution through Node.js child_process.
Classification
Working Poc 95%
Target:
React-based applications (specific version not specified)
No auth needed
Prerequisites:
Target application must be vulnerable to prototype pollution · DNS endpoint for exfiltration
nomisec
SCANNER
by KingHacker353 · remote
https://github.com/KingHacker353/R2C-CVE-2025-55182-66478
This repository contains a scanner for CVE-2025-55182, targeting React Server Components for potential RCE. The script is a bash-based tool with advanced visual effects and interactive features but lacks actual exploit payloads.
Classification
Scanner 90%
Target:
React Server Components
No auth needed
Prerequisites:
Target domain/URL · Network access to the target
nomisec
WORKING POC
by 0xROI · remote
https://github.com/0xROI/CVE-2025-55182
This is a Python-based exploit for CVE-2025-55182, designed to execute arbitrary commands via a vulnerability in an unspecified target software. The script includes Interactsh integration for DNS interaction verification, suggesting it may involve blind command injection or SSRF.
Classification
Working Poc 90%
Target:
Unspecified (likely a web application or service)
No auth needed
Prerequisites:
Network access to the target · Interactsh or similar DNS interaction service for verification
nomisec
WORKING POC
by itsismarcos · poc
https://github.com/itsismarcos/Bot-exploit-CVE-2025-55182
This repository contains a functional PoC for CVE-2025-55182 (React2Shell), a critical RCE vulnerability in React Server Components. The tool includes a scanner to detect vulnerable endpoints and an exploit to execute arbitrary commands via a crafted payload.
Classification
Working Poc 90%
Target:
React Server Components / Next.js
No auth needed
Prerequisites:
Target application using React Server Components · Accessible endpoint (e.g., /api/server-component)
nomisec
STUB
by bigbluewhale111 · poc
https://github.com/bigbluewhale111/CVE-2025-55182-LAB
The repository appears to be a minimal setup for reproducing CVE-2025-55182 but lacks exploit code or detailed vulnerability information. The provided files are basic configuration and placeholder code.
Target:
Unknown (Next.js application implied)
No auth needed
Prerequisites:
None identified
nomisec
STUB
by ckex · poc
https://github.com/ckex/test-vuln
The repository contains only a README file with minimal information about testing CVE-2025-55182, lacking any actual exploit code or technical details.
Target:
unspecified
No auth needed
Prerequisites:
none
nomisec
WRITEUP
by knightwolf01 · remote
https://github.com/knightwolf01/React2Shell
The repository contains a detailed writeup about CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability affecting React Server Components (RSC) and related frameworks like Next.js. The vulnerability is due to unsafe deserialization in the Flight protocol, allowing attackers to execute arbitrary code on the server without authentication.
Classification
Writeup 90%
Target:
React Server Components (RSC) and related frameworks (e.g., Next.js)
No auth needed
Prerequisites:
Vulnerable version of React Server Components or related frameworks · Network access to the target server
nomisec
SCANNER
by faizdotid · remote
https://github.com/faizdotid/rust-cve-2025-55182
This repository contains a Go-based scanner for CVE-2025-55182, designed to detect vulnerabilities in React applications. The scanner supports various modes, including safe checks, WAF bypass techniques, and custom payloads for RCE detection.
Classification
Scanner 90%
Target:
React applications (specific version not specified)
No auth needed
Prerequisites:
Network access to the target application · Vulnerable React application
nomisec
WORKING POC
by niokagi · remote
https://github.com/niokagi/react-cve-2025-55182
This repository contains a functional Proof-of-Concept (PoC) for CVE-2025-55182, demonstrating a Prototype Pollution vulnerability in Next.js Server Actions. The exploit leverages insecure recursive merge operations to achieve Remote Code Execution (RCE) via React Server Components (RSC) Flight protocol deserialization.
Classification
Working Poc 95%
Target:
Next.js 15
No auth needed
Prerequisites:
Next.js application with vulnerable `deepMerge` implementation · Valid Next-Action ID · Network access to the target
nomisec
WORKING POC
by TamaGorengs · remote
https://github.com/TamaGorengs/react2shell-poc-CVE-2025-55182
This is a functional PoC for CVE-2025-55182, exploiting a prototype pollution and insecure deserialization vulnerability in Next.js Server Actions to achieve remote code execution (RCE). The exploit leverages the React Server Components 'Flight' protocol to inject arbitrary JavaScript code, bypassing sandbox restrictions to execute system commands.
Classification
Working Poc 95%
Target:
Next.js (Server Actions)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with Server Actions enabled · Network access to the target application
nomisec
WORKING POC
by mahaveer-choudhary · poc
https://github.com/mahaveer-choudhary/CVE-2025-55182
This repository contains a Python-based scanner and exploit tool for CVE-2025-55182, targeting React Server Components (RSC) vulnerabilities in Next.js applications. It includes passive detection, active fingerprinting, and RCE exploitation capabilities.
Classification
Working Poc 90%
Target:
Next.js applications using App Router with React Server Components
No auth needed
Prerequisites:
Python 3.8+ · Next.js application with RSC enabled · Network access to target
nomisec
WORKING POC
by dajneem23 · poc
https://github.com/dajneem23/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in Next.js server actions. The exploit leverages crafted multipart form data to achieve remote code execution via Node.js child process execution.
Classification
Working Poc 95%
Target:
Next.js versions 15.0.0-16.0.6
No auth needed
Prerequisites:
Vulnerable Next.js server running locally or remotely · Network access to the target server
nomisec
SCANNER
by degenwithheart · poc
https://github.com/degenwithheart/React2Shell-Vulnerability-Verification-Script
This is a Python-based vulnerability scanner for CVE-2025-55182 (React2Shell), which checks for vulnerable React/Next.js versions and scans for React Server Components usage patterns.
Classification
Scanner 95%
Target:
React 19.0.0-19.0.3, 19.1.0-19.1.4, 19.2.0-19.2.3; Next.js 15.0.0-15.0.7, 15.1.0-15.1.11, 15.2.0-15.2.8, 15.3.0-15.3.8, 15.4.0-15.4.10, 15.5.0-15.5.9, 16.0.0-16.0.10
No auth needed
Prerequisites:
Python 3 · packaging library · package.json in the project directory
nomisec
SCANNER
by rashedhasan090 · poc
https://github.com/rashedhasan090/cve-2025-55182-mitigator
This repository provides a defensive scanner and mitigation guidance for CVE-2025-55182, which involves insecure deserialization in React Server Components / Flight protocol. It checks dependency versions and lockfiles to identify potentially vulnerable repositories.
Classification
Scanner 100%
Attack Type
Deserialization
Target:
React Server Components / Flight protocol (React 19.x, Next.js 15.x-16.x)
No auth needed
Prerequisites:
Access to the target repository's dependency files (package.json, lockfiles)
nomisec
WORKING POC
by r4j3sh-com · remote
https://github.com/r4j3sh-com/CVE-2025-55182
This repository contains a Go-based toolkit for detecting and exploiting CVE-2025-55182, a deserialization vulnerability in React Server Components (RSC) that allows remote code execution (RCE). It includes a scanner for identifying vulnerable targets and a PoC for sending exploit-style requests.
Classification
Working Poc | Scanner | Writeup 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0.0, 19.1.0-19.1.1, 19.2.0
No auth needed
Prerequisites:
Target must be running a vulnerable version of React Server Components · Target must be accessible over HTTP/HTTPS
nomisec
WORKING POC
by pwnxpl0it · poc
https://github.com/pwnxpl0it/react2shell-lab
This repository contains a deliberately vulnerable Next.js application designed to demonstrate CVE-2025-55182 and CVE-2025-66478, which involve Remote Code Execution (RCE) in React Server Components via Server Actions manipulation.
Classification
Working Poc 95%
Target:
Next.js with React Server Components (Next.js 15.0.3, React 19.0.0-rc-66855b96-20241106)
No auth needed
Prerequisites:
Next.js application with React Server Components and Server Actions enabled · Network access to the vulnerable application
nomisec
SCANNER
by 0xSalm0n · poc
https://github.com/0xSalm0n/CVE-2025-55182
This repository contains a setup script and Nuclei templates for scanning React/Next.js applications vulnerable to CVE-2025-55182 and CVE-2025-66478. The exploit leverages prototype pollution and server-side request forgery to achieve remote code execution.
Classification
Scanner 90%
Target:
React/Next.js with Server Components
No auth needed
Prerequisites:
Nuclei installed · Go installed · Python3 installed
nomisec
WORKING POC
by scumfrog · remote
https://github.com/scumfrog/FiberBreak
FiberBreak is a functional exploitation framework for CVE-2025-55182, a critical RCE vulnerability in React Server Components. It leverages prototype pollution and Function constructor exposure to achieve remote code execution via crafted multipart/form-data requests.
Classification
Working Poc 100%
Target:
React 19.0.0-rc.0 to 19.0.0, Next.js 15.0.0 to 15.0.3
No auth needed
Prerequisites:
Target must be running vulnerable versions of React/Next.js · Network access to the target server
nomisec
WORKING POC
by nulltrace1336 · poc
https://github.com/nulltrace1336/CVE-2025-55182-Metasploit-exploit-skeleton-real-flow-
This repository contains a working PoC for CVE-2025-55182, demonstrating a server-side command execution vulnerability in a Flask-based web application. It includes a vulnerable app, a Python PoC, and a Metasploit module skeleton for validation.
Classification
Working Poc 90%
Target:
Custom Flask web application (vuln_app/app.py)
No auth needed
Prerequisites:
Network access to the vulnerable endpoint · Flask application running with the vulnerable code
nomisec
WORKING POC
by jandelima · remote
https://github.com/jandelima/cve-2025-55182-poc-test
This repository contains a working proof-of-concept for CVE-2025-55182, demonstrating remote code execution (RCE) in a vulnerable Next.js + React Server Components environment. The exploit leverages React Flight to execute arbitrary code, confirmed by file creation and console output.
Classification
Working Poc 95%
Target:
Next.js 16.0.0, React 19.1.0, React-DOM 19.1.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js and React · Network access to the target application
nomisec
SCANNER
by Mustafa1p · remote
https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478
This repository contains a scanner for detecting CVE-2025-55182 and CVE-2025-66478, which are critical RCE vulnerabilities in Next.js applications using React Server Components. The scanner employs triple-layer detection with RCE, safe, and Vercel WAF bypass payloads.
Classification
Scanner 95%
Target:
Next.js applications with Server Actions enabled
No auth needed
Prerequisites:
Target must be a Next.js application with Server Actions enabled · Access to the target URL
nomisec
WORKING POC
by S-Mughal · poc
https://github.com/S-Mughal/NextJS-app-CVE-2025-55182
This is a functional proof-of-concept for CVE-2025-55182, demonstrating an RCE vulnerability in React Server Components via unsafe deserialization. The exploit leverages crafted multipart HTTP requests to execute arbitrary code on the server.
Classification
Working Poc 95%
Target:
React 19.0.0-19.2.0, Next.js 15.x-16.x (with App Router)
No auth needed
Prerequisites:
Target must be running vulnerable versions of React/Next.js · Server must be exposed to the attacker
nomisec
WORKING POC
by d0cnull · remote
https://github.com/d0cnull/nextjs-CVE-2025-55182
This repository contains a functional Proof of Concept (PoC) for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in Next.js Server Actions. The exploit leverages prototype pollution in the React Flight Protocol to execute arbitrary commands on the server.
Classification
Working Poc 100%
Target:
Next.js 15.x, 16.x, 14.3.0-canary.77+
No auth needed
Prerequisites:
Next.js application with Server Actions enabled · Network access to the target application
nomisec
WORKING POC
by EQSTLab · remote
https://github.com/EQSTLab/CVE-2025-55182
The PoC exploits a prototype pollution vulnerability in Next.js server actions to achieve remote code execution (RCE) by injecting malicious payloads into the request. The crafted chunk manipulates the prototype chain to execute arbitrary commands via `child_process.execSync`.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target server running vulnerable Next.js instance · Network access to the target
nomisec
WORKING POC
by premdanav · poc
https://github.com/premdanav/react2shelldemo
This repository contains a functional proof-of-concept for CVE-2025-55182, demonstrating Remote Code Execution (RCE) in React Server Components (RSC) via unsafe deserialization. The PoC includes three demos: minimal RCE, filesystem write, and directory enumeration, all targeting a local Next.js server.
Classification
Working Poc 95%
Target:
React Server Components (RSC) in Next.js (vulnerable versions)
No auth needed
Prerequisites:
Vulnerable React/Next.js environment · Local or remote access to the target server
nomisec
WORKING POC
by simantchaudhari · remote
https://github.com/simantchaudhari/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in Next.js applications using React Server Components (RSC). The exploit leverages a crafted multipart form request to execute arbitrary commands via prototype pollution and server-side JavaScript injection.
Classification
Working Poc 95%
Target:
Next.js with React Server Components (RSC)
No auth needed
Prerequisites:
Target must be a vulnerable Next.js application with RSC enabled · Network access to the target application
nomisec
WORKING POC
by hulh122 · remote
https://github.com/hulh122/CVE-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components. The exploit chains path traversal, fake chunk injection, and $B handler abuse to achieve remote code execution via Function constructor manipulation.
Classification
Working Poc 95%
Target:
React Server Components (Flight Protocol)
No auth needed
Prerequisites:
Access to a vulnerable React Server Components endpoint · Ability to send crafted multipart form data
nomisec
SCANNER
by Call123X · remote
https://github.com/Call123X/-cve-2025-55182
This repository contains a Python-based scanner for CVE-2025-55182, designed to detect vulnerabilities in target URLs by testing Linux and Windows payloads. It generates detailed Excel reports and logs for analysis.
Classification
Scanner 90%
Target:
Unknown (CVE-2025-55182 affected software)
No auth needed
Prerequisites:
Python 3.6+ · requests · openpyxl · urllib3
nomisec
WORKING POC
by CyberPrince-hub · poc
https://github.com/CyberPrince-hub/React2shell-ultimate-scanner
This repository contains a Bash-based scanner for CVE-2025-55182, a critical RCE vulnerability in Next.js React Server Components. The scanner automates detection and command execution via a crafted multipart form request.
Classification
Working Poc | Scanner 90%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
curl · openssl · Bash · target running vulnerable Next.js version
nomisec
WORKING POC
by tinashelorenzi · remote
https://github.com/tinashelorenzi/CVE-2025-55182
This repository contains a functional Python-based PoC for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) and Next.js. The exploit leverages prototype pollution and deserialization flaws to achieve unauthenticated remote code execution.
Classification
Working Poc 100%
Target:
React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0), Next.js (≥14.3.0-canary.77, 15.x, 16.x)
No auth needed
Prerequisites:
Target running vulnerable React/Next.js version · Network access to the target
nomisec
WORKING POC
by grejh0t · remote
https://github.com/grejh0t/CVE-2025-55182
This is a functional proof-of-concept exploit for CVE-2025-55182, leveraging unsafe deserialization in React Server Components to achieve unauthenticated remote code execution via prototype pollution and crafted HTTP requests.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0), Next.js (14.x Canary, 15.x, 16.x)
No auth needed
Prerequisites:
Vulnerable React Server Components or Next.js instance · Network access to the target server
nomisec
SCANNER
by h0tak88r · remote
https://github.com/h0tak88r/next88
This repository contains a Go-based scanner for detecting React Server Components RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478). It includes multiple detection methods, WAF bypass techniques, and flexible scanning options for single or multiple hosts.
Classification
Scanner 95%
Target:
React Server Components
No auth needed
Prerequisites:
Access to the target web application
nomisec
WORKING POC
by Ankitspandey07 · remote
https://github.com/Ankitspandey07/React2Shell
This repository contains a functional exploit for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in Next.js/React Server Components. The exploit leverages unsafe deserialization in Server Function endpoints to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Next.js/React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js/React Server Components · Network access to the target server
nomisec
WORKING POC
by dhananjayakumarn · remote
https://github.com/dhananjayakumarn/CVE-2025-55182-Lab
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components. The exploit leverages a prototype pollution technique to achieve remote code execution via a crafted HTTP request.
Classification
Working Poc 95%
Target:
React Server Components (React 19.0.0 - 19.2.0, Next.js 15.x - 16.0.6)
No auth needed
Prerequisites:
Target running vulnerable React/Next.js version · Network access to the target
nomisec
WRITEUP
by Kugelbyte · remote
https://github.com/Kugelbyte/React2Shell-Analysis
This repository contains only a README file with a brief description of CVE-2025-55182 (React2Shell), providing no actual exploit code or technical details. It appears to be a placeholder or preliminary analysis.
Classification
Writeup 90%
Target:
unknown (React2Shell implied)
No auth needed
nomisec
WORKING POC
by J4ck3LSyN-Gen2 · remote
https://github.com/J4ck3LSyN-Gen2/CVE-2025-55182
This repository contains a Python-based exploit toolkit for CVE-2025-55182, a critical pre-authentication RCE vulnerability in React Server Components (RSC) versions 19.0.0 to 19.2.0. The exploit leverages unsafe deserialization in React's Flight protocol to execute arbitrary commands or establish a reverse shell.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Python 3.8+ · requests library · target running vulnerable React Server Components
nomisec
WORKING POC
by ryanhafid · remote
https://github.com/ryanhafid/Scan_CVE-2025-55182
This is a mass exploitation script for CVE-2025-55182 (React2Shell), targeting Next.js applications. It automates payload injection and command execution across multiple targets using a crafted JSON payload and curl requests.
Classification
Working Poc 95%
Target:
Next.js applications
No auth needed
Prerequisites:
Linux environment with bash, curl, openssl, grep, and cut · List of target URLs in a text file
nomisec
WORKING POC
by ryanhafid · remote
https://github.com/ryanhafid/PoC_CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical pre-authentication Remote Code Execution (RCE) vulnerability in React Server Components (RSC) Flight protocol. The exploit leverages insecure deserialization to achieve prototype pollution and arbitrary command execution on vulnerable Next.js applications.
Classification
Working Poc 95%
Target:
Next.js (App Router) versions 15.x, 16.x, and 14.3.0-canary.77 and later, using affected React packages (react-server-dom-webpack, -parcel, -turbopack) versions 19.0.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Vulnerable Next.js application with React Server Components enabled · Network access to the target application
nomisec
WORKING POC
by byte16384 · remote
https://github.com/byte16384/CVE-2025-55182
This PoC exploits a prototype pollution vulnerability in React Server Components (CVE-2025-55182) to achieve RCE by injecting malicious payloads during deserialization. The exploit targets React 19.x and Next.js 15.x/16.x by manipulating the 'Next-Action' header and sending crafted multipart form data.
Classification
Working Poc 95%
Target:
React 19.0.0-19.2.0, Next.js 15.0.0-15.5.6, 16.0.0-16.0.6
No auth needed
Prerequisites:
Target server running vulnerable React/Next.js version · Network access to the target
nomisec
WORKING POC
by BakhodiribnYashinibnMansur · poc
https://github.com/BakhodiribnYashinibnMansur/CVE-2025-55182
This Go-based exploit targets CVE-2025-55182, a vulnerability in Next.js App Router, enabling remote command execution (RCE). The code includes multipart form-data payload construction, base64 response decoding, and concurrent scanning capabilities.
Classification
Working Poc 90%
Target:
Next.js App Router
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js App Router · Network access to the target
nomisec
WORKING POC
by oguri-souhei · remote
https://github.com/oguri-souhei/CVE-2025-55182
This repository contains a functional Proof of Concept (PoC) for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). The exploit leverages prototype pollution and gadget chains to execute arbitrary commands on the server via a crafted multipart form-data request.
Classification
Working Poc 95%
Target:
React Server Components (RSC) in React 19.0.0, 19.1.0, 19.1.1, 19.2.0 and corresponding Next.js versions like 15.x
No auth needed
Prerequisites:
Vulnerable version of React and Next.js · Network access to the target application
nomisec
WORKING POC
by W41T3D3V1L · remote
https://github.com/W41T3D3V1L/COMPLETE-CVE-2025-55182
This repository contains a Chrome extension and Shodan scanner for detecting and exploiting CVE-2025-55182, a React Server Components (RSC) / Next.js RCE vulnerability. The toolkit includes passive detection, active fingerprinting, and command execution capabilities.
Classification
Working Poc | Scanner 90%
Target:
React Server Components (RSC) / Next.js
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Chrome browser for extension usage · Shodan API key for scanning
nomisec
WORKING POC
by rahul-securify · poc
https://github.com/rahul-securify/React2Shell-CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, demonstrating remote code execution in Next.js applications via prototype pollution in the React server components rendering pipeline. The exploit includes a Python script that sends a crafted multipart request to trigger command execution.
Classification
Working Poc 95%
Target:
Next.js (version 15.4.7 or earlier)
No auth needed
Prerequisites:
Vulnerable Next.js application (version 15.4.7 or earlier) · Network access to the target server
nomisec
WORKING POC
by yuta3003 · remote
https://github.com/yuta3003/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a remote code execution vulnerability in React Server Functions (Next.js) due to prototype pollution in the React Flight Protocol deserialization process. The exploit leverages a crafted chunk to manipulate the prototype chain and execute arbitrary commands via the Function constructor.
Classification
Working Poc 95%
Target:
Next.js (versions <= 16.0.6) and React (versions before commit e2fd5dc6ad973dd3f220056404d0ae0a8707998d)
No auth needed
Prerequisites:
A vulnerable Next.js/React application with exposed server functions · Network access to the target application
nomisec
WORKING POC
by Shadowroot97 · remote
https://github.com/Shadowroot97/React2Shell-CVE-2025-55182
This repository contains a Python-based exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) due to unsafe deserialization in the React Flight protocol. The tool supports version detection, RCE verification via multiple techniques, and custom JavaScript payload execution.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0.0 - 19.2.0
No auth needed
Prerequisites:
Target must be running a vulnerable version of React Server Components · Network access to the target server
nomisec
WORKING POC
by 4nuxd · remote
https://github.com/4nuxd/React2Shell
R2S is a comprehensive exploitation framework targeting CVE-2025-55182, a Next.js React Server Components RCE vulnerability. It provides an interactive shell with advanced post-exploitation features including file transfer, privilege escalation checks, credential harvesting, and lateral movement capabilities.
Classification
Working Poc 95%
Target:
Next.js React Server Components
No auth needed
Prerequisites:
Python 3.6 or higher · Target running vulnerable Next.js React Server Components · Network connectivity to the target
nomisec
WORKING POC
by trax69 · remote
https://github.com/trax69/cve-2025-55182-poc
This repository contains a functional exploit PoC for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) due to insecure deserialization in the Flight protocol. The exploit manipulates prototype pollution and gadget chains to achieve arbitrary code execution on vulnerable React and Next.js servers.
Classification
Working Poc 95%
Prerequisites:
Docker and Docker Compose for environment setup · Python for running the exploit script
nomisec
WORKING POC
by LC-pro · remote
https://github.com/LC-pro/CVE-2025-55182-EXP
This is a functional exploit PoC for CVE-2025-55182, targeting a Node.js-based application (likely Next.js) via prototype pollution and command injection. The script supports multiple payload types for RCE, including command execution via `child_process` modules.
Classification
Working Poc 95%
Target:
Next.js (or similar Node.js framework)
No auth needed
Prerequisites:
Target application vulnerable to prototype pollution · Network access to the target
nomisec
SCANNER
by gonaumov · poc
https://github.com/gonaumov/cve-2025-55182-checker
This repository contains a Bash script that scans for vulnerable versions of React Server DOM and Next.js packages affected by CVE-2025-55182. It recursively checks package.json files and uses semver to compare installed versions against known vulnerable ranges.
Classification
Scanner 100%
Target:
React Server DOM (19.0.0, 19.1.0, 19.1.1, 19.2.0) and Next.js (<=15.0.4, <=15.1.8, <=15.2.5, <=15.3.5, <=15.4.7, <=15.5.6, <=16.0.6, >=14.3.0-canary.77)
No auth needed
Prerequisites:
Node.js + npm installed · Internet access to download jq binary · Dependencies installed via npm install
nomisec
WORKING POC
by ysfcndgr · remote
https://github.com/ysfcndgr/React2Shell-CVE-2025-55182-Advanced-Scanner
This repository contains a Python-based scanner and exploit tool for CVE-2025-55182, a critical RCE vulnerability in Next.js applications via React Server Components. The tool includes multiple payload variants and WAF bypass techniques for detection and exploitation.
Classification
Working Poc | Scanner 95%
Target:
Next.js applications with React Server Components
No auth needed
Prerequisites:
Python 3.6+ · pip dependencies · target URL
nomisec
SCANNER
by mrmtwoj · poc
https://github.com/mrmtwoj/React2Shell-CVE-2025-55182
This repository contains a Python-based tool designed to parse and validate IP addresses, wildcards, and CIDR ranges, with educational information about CVE-2025-55182. It does not perform exploitation or network scanning.
Classification
Scanner 90%
Target:
N/A (educational tool)
No auth needed
Prerequisites:
None (educational tool)
nomisec
SCANNER
by exrienz · remote
https://github.com/exrienz/CVE-2025-55182-NextJS-Scanner-React2Shell-PoC
This repository contains a Python-based scanner designed to detect Next.js applications by analyzing HTTP headers, body content, and JavaScript bundles. It does not include exploit code but identifies potential targets for CVE-2025-55182.
Classification
Scanner 90%
Target:
Next.js applications
No auth needed
Prerequisites:
List of target URLs
nomisec
WORKING POC
by min8282 · remote
https://github.com/min8282/CVE-2025-55182
This PoC exploits a prototype pollution vulnerability in Next.js to achieve remote code execution (RCE) via server-side JavaScript injection. The crafted payload manipulates the `__proto__` chain to execute arbitrary commands through `child_process.execSync`.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target Next.js application with vulnerable endpoint · Network access to the target
nomisec
WORKING POC
by ps-interactive · poc
https://github.com/ps-interactive/cve-2025-55182
This repository contains a Python-based exploit for CVE-2025-55182, a critical RCE vulnerability in React Server Components via `react-server-dom-webpack`. The exploit leverages prototype chain access to execute arbitrary commands on vulnerable servers.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack)
No auth needed
Prerequisites:
Vulnerable React Server Components setup · Access to the target endpoint
nomisec
SCANNER
by aspen-labs · poc
https://github.com/aspen-labs/CVE-2025-55182-checker
This repository contains a comprehensive vulnerability scanner for CVE-2025-55182, targeting React/Next.js applications. It employs multiple detection techniques, including gadget chain probes and WAF bypass methods, to safely test for the presence of the vulnerability without executing destructive payloads.
Classification
Scanner 95%
Target:
React/Next.js applications (specific version not specified)
No auth needed
Prerequisites:
Access to the target application's endpoint · Python 3.13 or higher · uv for dependency management
nomisec
WORKING POC
by CrazyloveforWeb · remote
https://github.com/CrazyloveforWeb/Golang-CVE-2025-55182-POC
This Go-based PoC exploits a prototype pollution vulnerability in a Next.js application to achieve remote code execution (RCE) via a malicious payload injected through form data. The exploit triggers command execution via `child_process.execSync('id')` and checks for vulnerability presence by detecting a specific response pattern.
Classification
Working Poc 90%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target application must be running a vulnerable version of Next.js · Network access to the target application
nomisec
WRITEUP
by sponte · poc
https://github.com/sponte/nextjs-cve-version-confusion
This repository demonstrates a version string discrepancy in Next.js 16.0.7+ that causes confusion when verifying CVE-2025-55182 patch status. It includes a script to check package versions and confirm the presence of the security fix despite inconsistent version strings.
Classification
Writeup 100%
Target:
Next.js 16.0.7+
No auth needed
Prerequisites:
Next.js 16.0.7+ installed
nomisec
SCANNER
by DanielXavierJob · poc
https://github.com/DanielXavierJob/-CVE-2025-55182
This repository contains a browser-based GitHub scanner for detecting CVE-2025-55182 (React Server Components vulnerability) and CVE-2025-66478 (Next.js App Router vulnerability) in repositories. It checks package.json files across all branches for vulnerable versions of React and Next.js packages.
Classification
Scanner 95%
Target:
GitHub repositories using React 19.0.0-19.2.0 or Next.js 14.3 canary, 15.x, 16.x
Auth required
Prerequisites:
Browser with DevTools access · GitHub account (optional for private repos) · Personal Access Token for private repos
nomisec
WORKING POC
by Legus-Yeung · remote
https://github.com/Legus-Yeung/CVE-2025-55182-exploit
This exploit demonstrates CVE-2025-55182, a critical RCE vulnerability in React Server Components by crafting a malicious HTTP request to a React Server Function endpoint. The payload leverages prototype pollution and server-side execution of arbitrary JavaScript code.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Vulnerable version of React Server Components · Exposed React Server Function endpoint
nomisec
WORKING POC
by Sotatek-KhaiNguyen3 · poc
https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
This repository contains a functional proof-of-concept for CVE-2025-55182, demonstrating a critical RCE vulnerability in React Server Components (versions 19.0.0-19.2.0) via unsafe deserialization. It includes a vulnerable Next.js application and an exploit script (`curl_id.sh`) to test the vulnerability.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0-19.2.0) in Next.js applications
No auth needed
Prerequisites:
Vulnerable React version (19.0.0-19.2.0) · Exposed Next.js server action endpoint
nomisec
SCANNER
by amir-malek · poc
https://github.com/amir-malek/react-cve-2025-55182
This repository provides a CLI tool to detect and fix CVE-2025-55182, a critical unauthenticated RCE vulnerability in React Server Components and Next.js. The tool scans for vulnerable package versions and suggests upgrades.
Classification
Scanner 100%
Target:
React Server DOM packages (19.0.0, 19.1.0, 19.1.1, 19.2.0), Next.js (14.3.0-canary.77 through unpatched 15.x and 16.x)
No auth needed
Prerequisites:
Node.js environment · package.json in the project directory
nomisec
WORKING POC
by gunyakit · remote
https://github.com/gunyakit/CVE-2025-55182-PoC-exploit
This PoC exploits a prototype pollution vulnerability in Next.js React Server Functions to achieve remote code execution (RCE) by injecting malicious payloads into the server-side processing chain. The exploit crafts a multipart request with a malicious chunk that triggers command execution via Node.js's `child_process` module.
Classification
Working Poc 95%
Target:
Next.js (version not specified, likely affecting versions with React Server Functions)
No auth needed
Prerequisites:
Target server running vulnerable Next.js instance · Network access to the target
nomisec
SCANNER
by iamblacksolo2-BugBounty · remote
https://github.com/iamblacksolo2-BugBounty/POC2-CVE-2025-55182
This repository contains a comprehensive scanner for CVE-2025-66478 (also referenced as CVE-2025-55182), a critical RCE vulnerability in Next.js applications using React Server Components (RSC). The tool supports multiple detection modes, including safe side-channel checks and RCE proof-of-concept execution, along with WAF bypass techniques.
Classification
Scanner 95%
Target:
Next.js 15.0.0-16.0.6 (RSC)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with RSC enabled
nomisec
WORKING POC
by osman-butt · remote
https://github.com/osman-butt/CVE-2025-55182-demo
This repository demonstrates a remote code execution (RCE) vulnerability in Next.js applications via a deserialization flaw (CVE-2025-55182). The exploit leverages a crafted multipart/form-data payload to inject and execute arbitrary JavaScript code on the server.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Docker and Docker Compose for running the vulnerable target · Python 3.8+ for executing the exploit script
nomisec
WRITEUP
by Stonelinks · poc
https://github.com/Stonelinks/react-cve-2025-55182
This repository documents a post-exploitation analysis of a compromised system via CVE-2025-55182, detailing malware artifacts, persistence mechanisms, and obfuscated Node.js payloads. It includes forensic findings but does not contain functional exploit code.
Classification
Writeup 90%
Target:
React Server Components (RSC) in Next.js/React applications
No auth needed
Prerequisites:
Vulnerable React Server Components implementation · Network access to target
nomisec
WORKING POC
by Jaycelation · remote
https://github.com/Jaycelation/CVE-2025-55182
This repository contains a functional PoC exploit and scanner for CVE-2025-55182, targeting a prototype pollution vulnerability in Next.js React Server Components (RSC) that leads to remote code execution (RCE). The exploit leverages multipart form data manipulation to inject malicious payloads, while the scanner includes WAF bypass techniques for detection.
Classification
Working Poc | Scanner 95%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Target running vulnerable Next.js version · Network access to the target
nomisec
WORKING POC
by liamromanis101 · remote
https://github.com/liamromanis101/cve-2025-55182
This is a functional Python exploit for CVE-2025-55182, targeting a server-side JavaScript injection vulnerability in Next.js/React applications. It achieves remote code execution by crafting malformed multipart form data to inject malicious payloads.
Classification
Working Poc 95%
Target:
Next.js/React applications (Next.js 16.0.6)
No auth needed
Prerequisites:
Python 3 · requests library · vulnerable Next.js application
nomisec
SCANNER
by eytannatye · remote
https://github.com/eytannatye/R2S_CVE-2025-55182
This repository contains a scanner for CVE-2025-55182, a critical RCE vulnerability in Next.js Server Actions due to prototype pollution in React Server Components. The scanner checks for vulnerability indicators, WAF presence, and attempts to confirm RCE via command execution.
Classification
Scanner 95%
Target:
Next.js (15.x < 15.5.7, 16.0.x < 16.0.7) and React (19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Target must have Next.js with Server Actions enabled · Network access to the target
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack
This repository provides a technical analysis and test case for CVE-2025-55182, focusing on the vulnerability in the `react-server-dom-turbopack` package. It includes details about affected versions, setup instructions, and a minimal example to verify the vulnerability.
Classification
Writeup 90%
Target:
react-server-dom-turbopack versions 19.0.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Node.js environment · npm · vulnerable versions of react-server-dom-turbopack
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-parcel
The repository contains minimal code and documentation for testing CVE-2025-55182 in react-server-dom-parcel but lacks functional exploit code or detailed technical analysis.
Target:
react-server-dom-parcel versions 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Vulnerable versions of react-server-dom-parcel installed
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-webpack
This repository contains a minimal test case for CVE-2025-55182, focusing on the react-server-dom-webpack package in isolation. It includes setup instructions and dependency details but lacks functional exploit code or technical analysis.
Target:
react-server-dom-webpack versions 19.0.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Installation of vulnerable react-server-dom-webpack package
nomisec
WRITEUP
by robbin0919 · remote
https://github.com/robbin0919/CVE-2025-55182
This repository contains a detailed writeup for CVE-2025-55182, a critical unsafe deserialization vulnerability in React Server Components (RSC) affecting versions 19.0.0 to 19.2.0, leading to unauthenticated remote code execution (RCE). The README provides an overview, impact analysis, and references to other PoC implementations.
Classification
Writeup 90%
Attack Type
Deserialization
Target:
React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0), Next.js (15.x/16.x with App Router)
No auth needed
Prerequisites:
Target application using React Server Components with vulnerable versions · Network access to the target server
nomisec
WORKING POC
by DevVaibhav07 · remote
https://github.com/DevVaibhav07/POC-CVE-2025-55182
This repository contains a functional exploit PoC for CVE-2025-55182, targeting a Remote Code Execution vulnerability in Next.js via React Server Components. The script crafts a multipart payload to abuse `process.mainModule.require('child_process').execSync()` for arbitrary command execution.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Vulnerable Next.js instance · Network access to the target
nomisec
WORKING POC
by joelvaiju · remote
https://github.com/joelvaiju/react2shell-CVE-2025-55182-poc
This is a functional Python PoC for CVE-2025-55182, exploiting a critical RCE vulnerability in React Server Components used by Next.js. It includes WAF bypass techniques via multipart padding to evade detection.
Classification
Working Poc 95%
Target:
Next.js 15.x–16.0.6, React 19.0.0–19.2.0 (with Server Components enabled)
No auth needed
Prerequisites:
Python 3.6+ · requests library · target running vulnerable Next.js/React version
nomisec
WORKING POC
by tlfyyds · poc
https://github.com/tlfyyds/cve-2025-55182-getshell
This repository contains a Python-based exploit for CVE-2025-55182, targeting a vulnerability in Next.js applications. The exploit leverages prototype pollution and server-side request forgery (SSRF) to achieve remote code execution (RCE) via child process spawn.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Network access to the target Next.js application · Python 3 environment
nomisec
WORKING POC
by iamblacksolo2-BugBounty · remote
https://github.com/iamblacksolo2-BugBounty/POC-CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a React Server Components RCE vulnerability in Next.js applications. The scanner.sh script crafts a malicious multipart form request to execute arbitrary commands on vulnerable systems.
Classification
Working Poc 95%
Target:
Next.js applications using React Server Components
No auth needed
Prerequisites:
Bash environment · curl · openssl · target running vulnerable Next.js version
nomisec
WORKING POC
by rsch-io · remote
https://github.com/rsch-io/CVE-2025-55182-React2Shell
This repository contains a functional PoC exploit for CVE-2025-55182, demonstrating remote code execution (RCE) via insecure deserialization in React Server Components (RSC). The exploit targets vulnerable versions of React and frameworks like Next.js, leveraging multiple strategies for payload delivery and WAF evasion.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-*) versions 19.0.0–19.2.0, Next.js versions 15.0.0–16.0.6, and other frameworks using vulnerable RSC implementations
No auth needed
Prerequisites:
Node.js v18.0.0 or higher · Target application exposing RSC endpoints · Vulnerable versions of React/Next.js or related frameworks
nomisec
SCANNER
by MoisesTapia · infoleak
https://github.com/MoisesTapia/http-react2shell
This repository contains an Nmap NSE script for detecting CVE-2025-55182 and CVE-2025-66478 in React Server Components and Next.js deployments. The script uses a side-channel technique to identify vulnerable systems by analyzing server responses to malformed React Flight payloads.
Classification
Scanner 100%
Target:
React Server Components, Next.js
No auth needed
Prerequisites:
Nmap with NSE support · Network access to target
nomisec
WRITEUP
by solidevil14 · poc
https://github.com/solidevil14/Suricata-Rule-for-Detecting-CVE-2025-55182
This repository provides a technical explanation of how Suricata rule SID 900304 detects exploitation attempts of CVE-2025-55182, a critical vulnerability in Next.js involving Action Poisoning leading to Node.js RCE via prototype pollution and command execution through child_process.execSync().
Classification
Writeup 90%
Target:
Next.js
No auth needed
Prerequisites:
Next.js application with vulnerable configuration · ability to send crafted requests to the server
nomisec
WORKING POC
by lowercasenumbers · remote
https://github.com/lowercasenumbers/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical unauthenticated remote code execution vulnerability in React Server Components. The exploit leverages prototype pollution in the React Flight protocol deserialization to achieve arbitrary command execution on vulnerable Next.js and React applications.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) and Next.js versions 15.0.4 through 16.0.6
No auth needed
Prerequisites:
Network access to the target application · Vulnerable version of React Server Components or Next.js
nomisec
SCANNER
by mohit121312 · remote
https://github.com/mohit121312/CVE-2025-55182_full_exploit
The repository contains a Go-based scanner for detecting CVE-2025-55182, which appears to be a vulnerability in Next.js applications involving prototype pollution and RCE via the 'child_process' module. The scanner tests multiple payload types (standard, junk, vercel, unicode) to identify vulnerable targets.
Classification
Scanner 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Network access to the target Next.js application · Target application must be running a vulnerable version of Next.js
nomisec
WORKING POC
by jan0x190 · poc
https://github.com/jan0x190/CVE-2025-55182-Simple-Scanner-main
This repository contains functional exploit code for CVE-2025-55182, a critical RCE vulnerability in React Server Components. The exploit leverages unsafe deserialization in HTTP requests to Server Function endpoints, allowing unauthenticated attackers to execute arbitrary code.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Next.js application with vulnerable React Server Components
nomisec
WORKING POC
by I3r1h0n · remote
https://github.com/I3r1h0n/React2Shell
This repository contains a functional exploit for CVE-2025-55182, a React Flight Protocol deserialization vulnerability leading to remote code execution (RCE). The exploit manipulates object prototypes to achieve arbitrary command execution via a reverse shell payload.
Classification
Working Poc 95%
Target:
React v19.2.0 with Next.js v16.0.6
No auth needed
Prerequisites:
Vulnerable React/Next.js server · Network access to target · Netcat listener for reverse shell
nomisec
WORKING POC
by LQTjim · poc
https://github.com/LQTjim/next-bug-CVE-2025-55182
This PoC exploits a prototype pollution vulnerability in Next.js (CVE-2025-55182) to achieve remote code execution (RCE) via crafted multipart/form-data requests. The exploit manipulates the `__proto__` chain to inject malicious JavaScript into the server-side execution context.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target server running vulnerable Next.js instance · Network access to the target
nomisec
SCANNER
by AliAbdollahiii · poc
https://github.com/AliAbdollahiii/react2shell_detector
This repository contains a heuristic scanner for detecting React Server Components (RSC) vulnerabilities, specifically CVE-2025-55182. It performs non-invasive checks for RSC exposure, framework fingerprints, and version inference without exploiting the vulnerability.
Classification
Scanner 95%
Target:
React Server Components (RSC) in React 19 and Next.js
No auth needed
Prerequisites:
Network access to the target web application · Target must be running a vulnerable version of React or Next.js
nomisec
WRITEUP
by nerium-security · poc
https://github.com/nerium-security/CVE-2025-55182
This repository contains host-based detection rules for an RCE vulnerability in the React JavaScript framework, but no actual exploit code or PoC is provided. It appears to be a documentation or advisory repository rather than a functional exploit.
Classification
Writeup 90%
Target:
React JavaScript framework (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable React application
nomisec
SCANNER
by FurkanKAYAPINAR · poc
https://github.com/FurkanKAYAPINAR/React-Next-Scanner
This repository contains a Python-based CLI scanner designed to detect vulnerabilities in JavaScript stacks, specifically targeting CVE-2025-55182 and CVE-2025-66478. It performs heuristic probing without exploitation, focusing on fingerprint leaks and public indicators.
Classification
Scanner 100%
Target:
API services and Next.js applications
No auth needed
Prerequisites:
Python 3.x · Network access to target
nomisec
WORKING POC
by Night-have-dreams · remote
https://github.com/Night-have-dreams/CVE-2025-55182-PoC
This PoC exploits CVE-2025-55182, a prototype pollution vulnerability in a Next.js application, leading to remote code execution (RCE) via crafted JSON payloads. It includes WAF bypass techniques such as Unicode obfuscation, header randomization, and noise injection.
Classification
Working Poc 90%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Network access to the target Next.js application · Vulnerable version of the target software
nomisec
SCANNER
by yaupunal · infoleak
https://github.com/yaupunal/CVE-2025-55182-scanner
This repository contains a non-intrusive scanner for detecting exposed React Server Components (RSC) surfaces and crash-based vulnerabilities related to CVE-2025-55182 and CVE-2025-66478. It performs detection and classification without exploitation or command execution.
Classification
Scanner 95%
Target:
React Server Components (RSC) in Next.js applications
No auth needed
Prerequisites:
Access to the target URL or a list of target URLs
nomisec
WORKING POC
by randarts · remote
https://github.com/randarts/react-rce
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical pre-authentication remote code execution vulnerability in React and Next.js. The exploit leverages prototype pollution in the Flight protocol deserialization process to achieve RCE.
Classification
Working Poc 95%
Target:
React 19.0.0-19.2.0, Next.js 15.x-16.x
No auth needed
Prerequisites:
Target running vulnerable version of React/Next.js · Network access to the target application
nomisec
WORKING POC
by HUAHUAI23 · remote
https://github.com/HUAHUAI23/CVE-2025-55182-POC
This repository contains a functional proof-of-concept for CVE-2025-55182, a critical RCE vulnerability in React Server Components and Next.js. The exploit leverages prototype pollution and deserialization flaws in the Flight Protocol to achieve remote code execution via crafted multipart/form-data requests.
Classification
Working Poc 95%
Target:
React (19.0.0-19.2.0), Next.js (≥14.3.0-canary.77, ≥15, ≥16)
No auth needed
Prerequisites:
Target running vulnerable React/Next.js version · Network access to the target application
nomisec
WORKING POC
by Macaroniwdcheese · remote
https://github.com/Macaroniwdcheese/CVE-2025-55182-Lab
This repository contains a proof-of-concept exploit and scanner for CVE-2025-55182, a local RCE vulnerability in React Server Components (Next.js). The PoC includes a vulnerable Next.js application and a scanner tool to detect the vulnerability via crafted multipart POST requests.
Classification
Working Poc | Scanner 95%
Target:
Next.js with React Server Components
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send crafted HTTP requests
nomisec
WORKING POC
by LvMalware · remote
https://github.com/LvMalware/CVE-2025-55182
This Perl script exploits CVE-2025-55182 (Reac4Shell) by sending a malicious multipart/form-data POST request to a vulnerable target, achieving remote command execution via a crafted payload that leverages prototype pollution and command injection.
Classification
Working Poc 95%
Target:
Unknown (likely a React-based application with vulnerable form handling)
No auth needed
Prerequisites:
Target URL · Network access to the vulnerable application
nomisec
WORKING POC
by 7amzahard · remote
https://github.com/7amzahard/React2shell
This repository contains a Python-based exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in React Server Actions. The exploit crafts multipart form data payloads to achieve remote code execution (RCE) via JavaScript expression evaluation and command injection.
Classification
Working Poc 95%
Target:
React Server Actions (specific version not specified)
No auth needed
Prerequisites:
Target application using vulnerable React Server Actions · Network access to the target
nomisec
WORKING POC
by thekamran · remote
https://github.com/thekamran/CVE-2025-55182-Proof-of-Concept
This PoC demonstrates a Prototype Pollution vulnerability leading to Remote Code Execution (RCE) via chained JavaScript object properties. It exploits unvalidated user input to manipulate internal object structures and execute arbitrary commands using `child_process`.
Classification
Working Poc 95%
Target:
Server-side rendering implementations (specific software not explicitly named)
No auth needed
Prerequisites:
Target server running vulnerable SSR implementation · Network access to the target server
nomisec
WORKING POC
by TH-SecForge · poc
https://github.com/TH-SecForge/CVE-2025-55182
This PoC exploits a prototype pollution vulnerability in a React-based application to achieve remote code execution (RCE) via crafted multipart/form-data payloads. It leverages Node.js child_process execution through prototype manipulation and includes WAF bypass techniques.
Classification
Working Poc 90%
Target:
React-based applications (specific version not specified)
No auth needed
Prerequisites:
Target application vulnerable to prototype pollution · Network access to the target
nomisec
WORKING POC
by lee191 · remote
https://github.com/lee191/CVE-2025-55182
This repository contains a functional Python-based PoC for CVE-2025-55182, targeting a Next.js vulnerability to achieve remote command execution (RCE). The exploit leverages prototype pollution and a gadget chain to execute arbitrary commands via a crafted payload.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target running vulnerable Next.js instance · Network access to the target
nomisec
STUB
by wangzhengquan · poc
https://github.com/wangzhengquan/CVE-2025-55182
The repository contains only a README.md with promotional content for Google's AI Studio and no exploit code or technical details related to CVE-2025-55182.
Target:
unknown
No auth needed
nomisec
WORKING POC
by lincemorado97 · remote
https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478
This repository contains a functional PoC exploit for CVE-2025-55182, targeting a deserialization vulnerability in React Server Components (Next.js 16.x / React 19.x). The exploit manipulates the Chunk object's `then` property and leverages the `RESOLVED_MODEL` status to achieve remote code execution via `child_process.execSync`.
Classification
Working Poc 95%
Target:
Next.js 16.x (with App Router) / React 19.x
No auth needed
Prerequisites:
Python 3 · Vulnerable Next.js/React application with App Router · Network access to target
nomisec
STUB
by lalaterry · poc
https://github.com/lalaterry/CVE-2025-55182-React2Shell-lab
The repository contains minimal files (README and a Next.js config) with no actual exploit code. The README only provides Docker commands to build and run a container, while the config enables experimental server actions.
Target:
Unknown (Next.js configuration suggests a React-based application)
No auth needed
Prerequisites:
Docker environment
nomisec
WORKING POC
by fankh · remote
https://github.com/fankh/cve-2025-55182-test-lab-windows
This repository contains a functional proof-of-concept exploit for CVE-2025-55182 (React2Shell), demonstrating remote code execution (RCE) via prototype pollution and function constructor manipulation in React 19.1.0 and Next.js 15.1.0. The PoC includes automated test scripts, WAF bypass attempts, and a comparison between vulnerable and patched versions.
Classification
Working Poc 95%
Target:
React 19.0.0-19.1.1, Next.js <15.0.5/<15.1.9/<15.2.6/<15.3.6/<15.4.8/<15.5.7/<16.0.7
No auth needed
Prerequisites:
Docker environment · Network access to vulnerable application
nomisec
WORKING POC
by chitoz1300 · poc
https://github.com/chitoz1300/React2Shell-CVE-2025-55182
This repository contains a functional proof-of-concept for CVE-2025-55182, demonstrating remote code execution in Next.js 15.0.0 via React Server Components. The exploit leverages an unsafe `eval` implementation in an API endpoint to execute arbitrary JavaScript code.
Classification
Working Poc 95%
Target:
Next.js 15.0.0 with React Server Components
No auth needed
Prerequisites:
Network access to the vulnerable Next.js application · Vulnerable version of Next.js (15.0.0)
nomisec
WORKING POC
by DoobTheGoober · poc
https://github.com/DoobTheGoober/CVE-2025-55182-Test-Server
This repository provides a test server and PoC for CVE-2025-55182, a prototype pollution vulnerability in a React-based application leading to remote code execution (RCE). The exploit leverages multipart/form-data manipulation to inject malicious payloads, executing arbitrary commands via Node.js child_process.
Classification
Working Poc 90%
Target:
React-based application (specific version not specified)
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to send crafted multipart/form-data requests
nomisec
WORKING POC
by satriarizka · remote
https://github.com/satriarizka/CVE-2025-55182-Simple-Scanner
This repository contains a comprehensive toolkit for detecting and exploiting CVE-2025-55182, a critical RCE vulnerability in Next.js applications using React Server Components. It includes a Bash scanner, Python, and Go implementations for executing arbitrary commands on vulnerable targets.
Classification
Working Poc | Scanner 95%
Target:
Next.js applications using React Server Components
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with React Server Components enabled · Network access to the target application
nomisec
SCANNER
by vyvivekyadav04 · poc
https://github.com/vyvivekyadav04/RSC-Infra-Scanner
This repository contains a Python-based scanner designed to fingerprint domains likely using Next.js App Router or React Server Components (RSC) infrastructure. It does not exploit any vulnerabilities but helps identify potential targets for CVE-2025-55182 and CVE-2025-66478 by analyzing HTTP responses and HTML content.
Classification
Scanner 100%
Target:
Next.js App Router / React Server Components (RSC)
No auth needed
Prerequisites:
List of domains or URLs in a file named 'List.txt'
nomisec
SCANNER
by umairahmadh · poc
https://github.com/umairahmadh/react-vuln-scanner
This repository contains a bash script designed to scan systems for React applications vulnerable to CVE-2025-55182, a critical RCE vulnerability in React Server Components. The script checks for specific vulnerable versions of React Server DOM packages and provides detailed, color-coded output.
Classification
Scanner 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Bash 4.0+ · Linux/macOS environment · Access to file system directories
nomisec
WORKING POC
by andressuarezmonk · remote
https://github.com/andressuarezmonk/CVE-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, which allows remote code execution (RCE) in React Server Functions, specifically in Next.js, through insecure prototype references in the React Flight Protocol. The exploit leverages prototype pollution to overwrite the `then` property of a crafted chunk, leading to arbitrary code execution during deserialization.
Classification
Working Poc 95%
Target:
Next.js (React Server Functions)
No auth needed
Prerequisites:
Access to a vulnerable Next.js server with React Server Functions enabled
nomisec
WORKING POC
by zxz3650 · remote
https://github.com/zxz3650/CVE-2025-55182-POC
This repository contains a proof-of-concept exploit for CVE-2025-55182, a critical React Server Components (RSC) unsafe deserialization vulnerability leading to RCE. It includes an advanced exploit script, a vulnerability scanner, and a vulnerable Docker environment for testing.
Classification
Working Poc 95%
Target:
React 19.x, Next.js 15.x/16.x (App Router)
No auth needed
Prerequisites:
Target running vulnerable React/Next.js versions · Network access to the target
nomisec
WORKING POC
by hunter24x24 · remote
https://github.com/hunter24x24/CVE-2025-55182-mass
This repository contains a functional proof-of-concept scanner and exploit for CVE-2025-55182, targeting React Server Components in Next.js applications. The tool supports both safe detection and RCE exploitation via command injection, with features like WAF bypass and concurrent scanning.
Classification
Working Poc 95%
Target:
Next.js applications using React Server Components
No auth needed
Prerequisites:
Target must be a vulnerable Next.js application · Network access to the target
nomisec
SCANNER
by shakilkhatri · poc
https://github.com/shakilkhatri/scanner-for-CVE-2025-55182-vulnerability
This repository contains a Python script designed to scan GitHub repositories for dependencies vulnerable to CVE-2025-55182, a critical RCE affecting specific versions of React Server Components and Next.js. It authenticates via a GitHub Personal Access Token (PAT) and generates a Markdown report.
Classification
Scanner 100%
Target:
GitHub repositories with React/Next.js dependencies
Auth required
Prerequisites:
GitHub Personal Access Token (PAT) with 'repo' scope · Python 3.6+ · requests and packaging libraries
nomisec
WORKING POC
by ethicalrohitt · remote
https://github.com/ethicalrohitt/React2Shell_cve-2025-55182
This repository provides a working proof-of-concept for CVE-2025-55182, demonstrating remote code execution (RCE) in React Server Components via prototype pollution and unsafe deserialization. The exploit leverages multipart form data to inject malicious payloads that execute arbitrary commands on the server.
Classification
Working Poc 95%
Target:
React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Target server running vulnerable React Server Components · Network access to the target server
nomisec
WORKING POC
by ahmedshamsddin · poc
https://github.com/ahmedshamsddin/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting a vulnerability in React Server Components (RSC) in Next.js 16.0.6. The exploit injects a memory-based shell via a crafted multipart/form-data request, enabling remote code execution (RCE) through HTTP requests.
Classification
Working Poc 95%
Target:
Next.js 16.0.6
No auth needed
Prerequisites:
Target running Next.js 16.0.6 with vulnerable RSC configuration · Network access to the target application
nomisec
WORKING POC
by MikeTheHash · remote
https://github.com/MikeTheHash/CVE-2025-55182
This is a working exploit for CVE-2025-55182, a pre-authentication RCE vulnerability in React Server versions 19.0, 19.1.0, 19.1.1, and 19.2.0. The exploit leverages prototype pollution to execute arbitrary commands via crafted chunk references.
Classification
Working Poc 95%
Target:
React Server (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) versions 19.0, 19.1.0, 19.1.1, 19.2.0
No auth needed
Prerequisites:
Target server running vulnerable React Server version · Network access to the target
nomisec
WORKING POC
by klassiker · infoleak
https://github.com/klassiker/CVE-2025-55182
This repository contains a proof-of-concept exploit for CVE-2025-55182, which involves prototype traversal vulnerabilities in React's server components. The PoC demonstrates unsafe prototype traversal in React's server-side code, specifically in the `react-server-dom-webpack-server.node.unbundled.development.js` file.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack-server.node.unbundled.development.js)
No auth needed
Prerequisites:
Access to a vulnerable React server component endpoint
nomisec
WORKING POC
by shreyas-malhotra · poc
https://github.com/shreyas-malhotra/React2Shell-CVE-2025-55182
This PoC exploits CVE-2025-55182 to achieve RCE via vm.runInThisContext in a React-based application. It sends crafted multipart form data to trigger arbitrary code execution, including a reverse shell payload.
Classification
Working Poc 90%
Target:
React-based application (version unspecified)
No auth needed
Prerequisites:
Network access to the target application · Target application must be vulnerable to CVE-2025-55182
nomisec
WORKING POC
by aseemyash · remote
https://github.com/aseemyash/krle
This repository contains a working proof-of-concept exploit for CVE-2025-55182, a critical RCE vulnerability in Next.js applications utilizing Server Actions. The exploit leverages prototype pollution to achieve unauthenticated arbitrary code execution.
Classification
Working Poc 100%
Target:
Next.js (versions with Server Actions enabled)
No auth needed
Prerequisites:
Next.js application with Server Actions enabled · Network access to the target application
nomisec
WORKING POC
by 0xN7y · remote
https://github.com/0xN7y/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, a prototype pollution vulnerability in Next.js 16.0.6. The exploit leverages improper input sanitization to achieve remote code execution (RCE) via prototype chain manipulation and insecure deserialization.
Classification
Working Poc 95%
Target:
Next.js 16.0.6
No auth needed
Prerequisites:
Target running Next.js 16.0.6 · Network access to the target
nomisec
SCANNER
by aastikgakhar · poc
https://github.com/aastikgakhar/CVE-2025-55182-react2shell
This repository contains a Nuclei template designed to detect exposed React Server Components (RSC) endpoints vulnerable to CVE-2025-55182. The template sends a benign handshake with RSC negotiation headers and checks for specific response patterns indicative of an exposed RSC runtime.
Classification
Scanner 95%
Target:
React/Next.js applications with exposed RSC endpoints
No auth needed
Prerequisites:
Target application using React/Next.js with RSC endpoints
nomisec
SCANNER
by w3irdo21 · poc
https://github.com/w3irdo21/CVE-2025-55182-react2shell
This repository contains a Nuclei template for detecting exposed React Server Components (RSC) associated with CVE-2025-55182. It identifies endpoints that respond with RSC-specific markers, confirming potential exposure to deserialization-based RCE.
Classification
Scanner 90%
Target:
React/Next.js applications with exposed RSC endpoints
No auth needed
Prerequisites:
Access to the target application · Nuclei installed
nomisec
WORKING POC
by orgito1015 · remote
https://github.com/orgito1015/CVE-2025-55182-RCE-Exploit
This repository contains a working proof-of-concept exploit for CVE-2025-55182, a critical deserialization vulnerability in Next.js 16.0.6. The exploit abuses chunk deserialization and prototype pollution to achieve remote code execution via arbitrary command injection.
Classification
Working Poc 95%
Target:
Next.js 16.0.6
No auth needed
Prerequisites:
Next.js 16.0.6 server running · Network access to the target
nomisec
SCANNER
by Bashamega · poc
https://github.com/Bashamega/react-CVE-2025-55182-fixer
This repository provides a script to automatically scan for and patch vulnerable React Server Components packages affected by CVE-2025-55182. It creates pull requests with updated dependencies to mitigate the vulnerability.
Classification
Scanner 95%
Target:
React Server Components (react-server-dom-*, react, react-dom, next)
Auth required
Prerequisites:
Node.js >= 18 · GitHub personal access token with repo permissions · Octokit
nomisec
WORKING POC
by MrSol0 · remote
https://github.com/MrSol0/CVE-2025-55182-Terminal
This repository contains a functional PoC for CVE-2025-55182, targeting a Next.js React Server Components (RSC) RCE vulnerability. The script includes both single-target and mass-scanning capabilities, with an interactive shell for command execution on vulnerable targets.
Classification
Working Poc 95%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Network access to the target Next.js application · Vulnerable version of Next.js with exposed RSC endpoints
nomisec
SCANNER
by yunaranyancat · remote
https://github.com/yunaranyancat/CVE-2025-55182-NSE
This repository contains an Nmap NSE script for detecting CVE-2025-55182. The script is intended to scan target systems for the vulnerability but lacks detailed implementation or exploit code.
Classification
Scanner 80%
Target:
Unknown (CVE-2025-55182)
No auth needed
Prerequisites:
Nmap with NSE support
nomisec
SCANNER
by Kryptopacy · poc
https://github.com/Kryptopacy/Next.js-RCE-Patcher--CVE-2025-55182-
This repository provides a patching tool for CVE-2025-55182, a critical RCE vulnerability in Next.js. It scans for vulnerable Next.js versions and automates the update process to safe versions.
Classification
Scanner 90%
Target:
Next.js (versions 14.x, 15.x, 16.x)
No auth needed
Prerequisites:
Access to the target system · Presence of vulnerable Next.js versions
nomisec
WORKING POC
by MaxK9999 · remote
https://github.com/MaxK9999/CVE-2025-55182
This exploit leverages a prototype pollution vulnerability in a Node.js application to achieve remote code execution (RCE) via crafted JSON payloads. It uses the `child_process.execSync` method to execute arbitrary commands and extracts the output from the server's error response.
Classification
Working Poc 95%
Target:
Node.js application (specific version not specified)
No auth needed
Prerequisites:
Target application must be vulnerable to prototype pollution · Network access to the target
nomisec
WORKING POC
by zorejt · remote
https://github.com/zorejt/Rust_CVE-2025-55182
This repository contains a Rust-based exploit for CVE-2025-55182, targeting a remote code execution vulnerability in [email protected]. The exploit constructs malicious Server Action requests to execute arbitrary JavaScript code via Node.js modules like vm#runInThisContext.
Classification
Working Poc 95%
Prerequisites:
Target server running [email protected] · Network access to the target server
nomisec
WORKING POC
by Dread1ess · poc
https://github.com/Dread1ess/CVE-2025-55182
This repository contains a functional Python-based exploit for CVE-2025-55182, a pre-authentication RCE vulnerability in React Server Components (RSC) due to unsafe deserialization. The PoC leverages prototype pollution to achieve command execution via crafted Flight protocol payloads.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-*) versions 19.0.0-19.2.0, Next.js 15.x-16.x (pre-16.0.7)
No auth needed
Prerequisites:
Target running vulnerable React Server Components or Next.js · Network access to the target server
nomisec
WORKING POC
by StillSoul · remote
https://github.com/StillSoul/CVE-2025-55182
This repository contains a functional Proof of Concept (PoC) for CVE-2025-55182, a critical pre-authentication remote code execution vulnerability in React Server Components (RSC) due to unsafe deserialization. The exploit leverages prototype pollution to achieve RCE via a crafted Flight protocol payload.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack) versions 19.0.0-19.2.0, Next.js versions 15.x and 16.x prior to 16.0.7
No auth needed
Prerequisites:
Target must be running a vulnerable version of React Server Components or Next.js · Network access to the target server
nomisec
WRITEUP
by prestonhashworth · poc
https://github.com/prestonhashworth/cve-2025-55182
This repository provides a collection of tools and documentation for testing and mitigating CVE-2025-55182, including Postman collections, cURL examples, and F5 WAF signature details. It references an external PoC repository for actual exploit testing.
Classification
Writeup 90%
Target:
F5 BIG-IP (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable F5 BIG-IP instance · Postman or cURL for testing
nomisec
SCANNER
by mxm0z · poc
https://github.com/mxm0z/r2s
This repository contains a Cloudflare Worker-based scanner for detecting CVE-2025-55182, a critical RCE vulnerability in React Server Components. The scanner sends a safe detection payload to determine if a target is vulnerable without executing arbitrary code.
Classification
Scanner 95%
Target:
React (19.0.0-19.2.0), Next.js (15.0.0-16.0.6)
No auth needed
Prerequisites:
Target must be running a vulnerable version of React or Next.js · Target must be accessible over HTTP/HTTPS
nomisec
WORKING POC
by NathanJ60 · poc
https://github.com/NathanJ60/react2shell-interactive
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a Remote Code Execution (RCE) vulnerability in React Server Components (RSC) affecting specific versions of Next.js and Waku. The exploit leverages prototype chain traversal to reach the Function constructor, enabling arbitrary JavaScript execution on the server.
Classification
Working Poc 95%
Target:
Next.js < 15.1.7, < 14.2.29, < 13.5.9 and Waku (various versions)
No auth needed
Prerequisites:
Vulnerable version of Next.js or Waku · Network access to the target server
nomisec
WORKING POC
by zessu · poc
https://github.com/zessu/CVE-2025-55182-Typescript
This PoC exploits a prototype pollution vulnerability in Next.js to achieve remote code execution (RCE) by manipulating the `then` property in a crafted chunk, leading to arbitrary command execution via `child_process.execSync`.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target server running Next.js with vulnerable endpoint · Network access to the target
nomisec
WORKING POC
by 0xPThree · poc
https://github.com/0xPThree/cve-2025-55182
This repository contains a working proof-of-concept exploit for CVE-2025-55182, a remote code execution vulnerability in React Server Components. The exploit leverages prototype pollution and server-side JavaScript execution to achieve RCE via crafted multipart/form-data requests.
Classification
Working Poc 95%
Target:
React Server Components (Next.js)
No auth needed
Prerequisites:
Target application using vulnerable React Server Components · Network access to the target
nomisec
WORKING POC
by nomorebreach · poc
https://github.com/nomorebreach/POC-CVE-2025-55182
The PoC demonstrates a remote code execution (RCE) vulnerability in React Server Components (RSC) via deserialization. It crafts a malicious HTTP request that exploits the serialization layer in `react-server-dom-*` packages to execute arbitrary commands on the server.
Classification
Working Poc 95%
Target:
React Server Components (RSC) in react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack (v19.0.0 - v19.2.0)
No auth needed
Prerequisites:
Vulnerable version of React Server Components (RSC) packages · Network access to the target server
nomisec
WORKING POC
by RajChowdhury240 · poc
https://github.com/RajChowdhury240/React2Shell-CVE-2025-55182
This PoC exploits CVE-2025-55182, a prototype pollution vulnerability in React Server Components, allowing remote command execution via crafted form-data payloads. The exploit leverages JavaScript prototype manipulation to execute arbitrary commands through Node.js's child_process module.
Classification
Working Poc 90%
Target:
React Server Components (version not specified)
No auth needed
Prerequisites:
Target application using vulnerable React Server Components · Network access to the target
nomisec
WORKING POC
by alexandre-briongos-wavestone · poc
https://github.com/alexandre-briongos-wavestone/react-cve-2025-55182-lab
This PoC demonstrates a prototype pollution vulnerability in a React/Next.js application (CVE-2025-55182) via a crafted multipart/form-data POST request, leading to arbitrary JavaScript execution on the server. The exploit leverages the `Next-Action` header and malformed form data to trigger deserialization of a malicious payload.
Classification
Working Poc 90%
Target:
Next.js (version not specified, likely affected by React Server Components vulnerability)
No auth needed
Prerequisites:
Docker for setup · Network access to target server
nomisec
SCANNER
by nanwinata · remote
https://github.com/nanwinata/CVE-2025-55182-Scanner
This repository contains a Python-based scanner for CVE-2025-55182, a critical RCE vulnerability in React Server Components. The scanner tests for unsafe deserialization by executing arithmetic operations via command injection and checking for the result in HTTP headers.
Classification
Scanner 95%
Target:
React Server Components (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0), Next.js, react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack
No auth needed
Prerequisites:
Target must be running a vulnerable version of React Server Components · Target must be accessible via HTTP/HTTPS
nomisec
WRITEUP
by ngvcanh · poc
https://github.com/ngvcanh/CVE-2025-55182-Attack-Analysis
This repository is a detailed writeup analyzing an attack exploiting CVE-2025-55182 (React2Shell), a critical RCE vulnerability in React Server Components. It includes technical analysis, malware breakdown, and indicators of compromise from a real-world attack on a Next.js application.
Classification
Writeup 100%
Target:
React (19.0.0-19.2.1), Next.js (15.x-16.x pre-patch)
No auth needed
Prerequisites:
Vulnerable React/Next.js version · Network access to the target server · Ability to send crafted POST requests
nomisec
WORKING POC
by younesZdDz · remote
https://github.com/younesZdDz/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, targeting a vulnerability in Next.js 16 (React 19) involving improper handling of multipart requests with a `Next-Action` header. The exploit demonstrates remote command execution by leveraging prototype pollution and deserialization to execute arbitrary commands on the server.
Classification
Working Poc 95%
Target:
Next.js 16 (React 19)
No auth needed
Prerequisites:
Node.js 18+ · Next.js 16 application running locally or remotely · Access to the target server's endpoint
nomisec
SCANNER
by sherlocksecurity · poc
https://github.com/sherlocksecurity/CVE-2025-55182-Exploit-scanner
This repository contains a scanner for CVE-2025-55182, which appears to target a prototype pollution vulnerability in a Node.js-based web framework (likely Next.js). The scanner includes both safe detection and RCE payload generation capabilities, with options for WAF bypass techniques.
Classification
Scanner 95%
Target:
Next.js (or similar Node.js web framework)
No auth needed
Prerequisites:
Target must be running vulnerable version of the software · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
by selectarget · remote
https://github.com/selectarget/CVE-2025-55182-Exploit
This is a functional exploit for CVE-2025-55182, targeting a prototype pollution vulnerability in React Server Components (Next.js) to achieve remote code execution. The exploit crafts a malicious multipart form payload to manipulate object prototypes and execute arbitrary commands.
Classification
Working Poc 95%
Target:
Next.js (15.x, 16.x) and react-server-dom-webpack (19.0.0-19.2.0)
No auth needed
Prerequisites:
Target must be running vulnerable versions of Next.js or react-server-dom-webpack · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
by topstar88 · poc
https://github.com/topstar88/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a critical arbitrary code execution vulnerability in React Server Components (RSC) due to improper validation in the `requireModule` function. The exploit demonstrates how an attacker can access the global `Function` constructor via prototype chain traversal and execute arbitrary code on the server.
Classification
Working Poc 100%
Target:
react-server-dom-webpack version 19.0.0
No auth needed
Prerequisites:
Node.js · npm · vulnerable version of react-server-dom-webpack (19.0.0)
nomisec
WORKING POC
by Darker-Ink · poc
https://github.com/Darker-Ink/react-ssr-vulnerability
This is a functional proof-of-concept exploit for CVE-2025-55182, targeting a React Server Components vulnerability. It leverages prototype pollution and JavaScript injection to achieve remote code execution (RCE) via crafted JSON payloads.
Classification
Working Poc 95%
Target:
React Server Components (specific version not specified)
No auth needed
Prerequisites:
Vulnerable React Server Components endpoint · Network access to the target
nomisec
SCANNER
by aquinn-r7 · poc
https://github.com/aquinn-r7/CVE-2025-55182-VulnCheckPOC
This is a vulnerability scanner for CVE-2025-55182, which checks for React Server Components (RSC) vulnerability in Next.js applications. It sends a crafted POST request and checks for a specific error response to determine vulnerability.
Classification
Scanner 95%
Target:
Next.js applications with React Server Components
No auth needed
Prerequisites:
Target URL list
nomisec
WRITEUP
by im-hanzou · poc
https://github.com/im-hanzou/CVE-2025-55182-POC-SCANNER
The repository contains a detailed writeup and proof-of-concept for CVE-2025-55182, a critical pre-authentication RCE vulnerability in React Server Components affecting React 19.x and Next.js 15.x-16.x. The vulnerability stems from improper validation in the `requireModule` function, allowing prototype chain traversal and arbitrary code execution.
Classification
Writeup 90%
Target:
React 19.0.0-19.2.0, Next.js 15.x-16.x
No auth needed
Prerequisites:
React Server Components enabled · Network access to vulnerable application
nomisec
SCANNER
by Chelsea486MHz · poc
https://github.com/Chelsea486MHz/CVE-2025-55182-test
This repository contains a Python-based scanner to detect potential exposure to CVE-2025-55182 in React19 or Next.JS endpoints by checking for RSC (React Server Components) headers and server responses. It sends a crafted POST request with specific headers and payloads to determine if the target is vulnerable.
Classification
Scanner 95%
Target:
React19 or Next.JS with RSC endpoints
No auth needed
Prerequisites:
Network access to the target endpoint
nomisec
SCANNER
by dissy123 · poc
https://github.com/dissy123/cve-2025-55182
This repository contains a vulnerability scanner for CVE-2025-55182, which targets React Server Components (RSC) and Next.js for potential Remote Code Execution (RCE). The script checks for vulnerable versions of specific packages and provides detailed output.
Classification
Scanner 95%
Target:
React Server Components (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) and Next.js versions 14.3.0-canary.77 to 16.0.0 (excluding patched versions)
No auth needed
Prerequisites:
Access to the target system's package.json and package-lock.json files
nomisec
WORKING POC
by joshterrill · poc
https://github.com/joshterrill/CVE-2025-55182-realistic-poc
This repository contains a functional proof-of-concept for CVE-2025-55182, a critical RCE vulnerability in React Server Components. The exploit leverages a missing `hasOwnProperty` check in the `requireModule` function, allowing arbitrary code execution via crafted HTTP requests.
Classification
Working Poc 100%
Prerequisites:
A server running a vulnerable version of react-server-dom-webpack · Network access to the target server
nomisec
WORKING POC
by carlosaruy · poc
https://github.com/carlosaruy/CVE-2025-55182
This repository contains a Python-based scanner and exploit tool for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). The exploit leverages insecure deserialization in the React Flight protocol to achieve RCE via the `vm#runInThisContext` gadget.
Classification
Working Poc 95%
Target:
React (19.0.0, 19.1.0, 19.1.1, 19.2.0) and Next.js (15.x, 16.x with App Router)
No auth needed
Prerequisites:
Target must be running a vulnerable version of React or Next.js · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
by ducducuc111 · poc
https://github.com/ducducuc111/CVE-2025-55182-poc
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, a prototype chain vulnerability in React Server Components. The exploit demonstrates RCE via `vm.runInThisContext` and other dangerous modules like `child_process` and `fs`.
Classification
Working Poc 95%
Target:
react-server-dom-webpack < 19.2.0
No auth needed
Prerequisites:
Node.js environment · Vulnerable version of react-server-dom-webpack
nomisec
WORKING POC
by atastycookie · poc
https://github.com/atastycookie/CVE-2025-55182
This repository contains a functional Python exploit for CVE-2025-55182, targeting a critical RCE vulnerability in React Server Components via `react-server-dom-webpack`. The exploit leverages multipart form data to inject malicious payloads, enabling arbitrary command execution or JavaScript code execution on vulnerable servers.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-webpack 19.0.0-19.2.0, Next.js 15.x-16.x with App Router)
No auth needed
Prerequisites:
Access to the target server's `/formaction` endpoint · Vulnerable version of `react-server-dom-webpack` or Next.js
nomisec
WORKING POC
by shen771 · poc
https://github.com/shen771/Blackash-CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, targeting an unauthenticated RCE vulnerability in Next.js and React Server Components via unsafe deserialization. It includes scripts for both basic command execution and reverse shell establishment.
Classification
Working Poc 95%
Target:
Next.js (14.3.0-canary.77 to 16.0.6), React Server Components (19.0.0 to 19.2.0)
No auth needed
Prerequisites:
Target running vulnerable Next.js/React Server Components · Network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/luoluoqingge/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, a critical pre-authentication remote code execution vulnerability in React Server Components and Next.js. The exploit leverages deserialization of untrusted data via crafted multipart/form-data requests to achieve RCE.
Classification
Working Poc 95%
Target:
React 19.x, Next.js 15.x-16.x
No auth needed
Prerequisites:
Target running vulnerable React/Next.js version · Network access to the target
vulncheck_xdb
WRITEUP
remote
https://github.com/zhixiangyao/CVE-2025-66478-Exploit-Poc
This repository provides a detailed technical analysis of CVE-2025-66478, a critical RCE vulnerability in Next.js due to insecure deserialization and prototype pollution in the RSC Flight protocol. It includes a thorough explanation of the attack mechanism, affected versions, and references but lacks actual exploit code.
Classification
Writeup 90%
Target:
Next.js (15.x, 16.x, 14.3.0-canary.77 and later)
No auth needed
Prerequisites:
Next.js application using App Router · Node.js v24 or later
vulncheck_xdb
WORKING POC
remote
https://github.com/CyberPrince-hub/CVE-2025-55182-Advanced-Scanner
This repository contains a functional Bash-based scanner and exploit for CVE-2025-55182, targeting a Remote Code Execution (RCE) vulnerability in Next.js React Server Components. The script crafts a multipart form request with a malicious payload to execute arbitrary commands on the server.
Classification
Working Poc 95%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
curl · openssl · bash · target running vulnerable Next.js version
vulncheck_xdb
WORKING POC
remote
https://github.com/InfoSecAntara/CTF-CVE-2025-55182-React-Server-Components-Prototype-Pollution-to-RCE.
This repository contains a functional exploit PoC for CVE-2025-55182, demonstrating a critical RCE vulnerability in React Server Components (versions 19.0.0-19.2.0) via prototype pollution. The exploit includes scripts to generate malicious payloads and execute arbitrary code on vulnerable servers.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0 - 19.2.0)
No auth needed
Prerequisites:
Docker · Node.js 18+ · vulnerable React Server Components endpoint
vulncheck_xdb
WORKING POC
remote
https://github.com/gguatit/React2Shell-CVE-2025-55182-
This repository contains a functional exploit PoC for CVE-2025-55182, demonstrating a pre-authentication RCE vulnerability in React Server Components (RSC) affecting Next.js and Waku frameworks. The exploit leverages unsafe deserialization of malicious payloads to execute arbitrary JavaScript code on the server via prototype manipulation and constructor chaining.
Classification
Working Poc 95%
Target:
React Server Components (RSC) in Next.js and Waku frameworks (React 19.0.0-19.2.0)
No auth needed
Prerequisites:
Network access to vulnerable RSC endpoint · React Server Components enabled on target
vulncheck_xdb
WORKING POC
remote
https://github.com/viperh/poc-cve-next
This repository contains a functional Go-based exploit for CVE-2025-55182, targeting a Next.js vulnerability. The exploit leverages a prototype pollution attack to achieve remote code execution (RCE) by injecting malicious JavaScript payloads into server-side processing.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js · Server-side JavaScript execution context must be accessible
vulncheck_xdb
WORKING POC
remote
https://github.com/securifyai/React2Shell-CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, demonstrating remote code execution in Next.js applications via prototype pollution in the React server components rendering pipeline. The exploit includes a Python script that crafts a malicious multipart request to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Next.js (version 15.4.7 or earlier)
No auth needed
Prerequisites:
Node.js (v16 or later) · Python 3.6+ · netcat (for reverse shells) · A vulnerable Next.js application
vulncheck_xdb
WORKING POC
infoleak
https://github.com/Code42Cate/nexts-cve-2025-66478-exploit
This repository contains functional exploit code for CVE-2025-66478, targeting a Next.js application. The exploit leverages a prototype pollution vulnerability to achieve remote code execution (RCE) via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Next.js 16.0.6
No auth needed
Prerequisites:
Access to the target Next.js application · Network connectivity to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable
This repository contains a functional proof-of-concept for CVE-2025-66478, demonstrating a prototype pollution vulnerability in Next.js 16 that leads to remote code execution (RCE). The PoC includes a crafted multipart/form-data request that exploits the vulnerability to execute arbitrary commands via child_process.execSync.
Classification
Working Poc 95%
Target:
Next.js 16
No auth needed
Prerequisites:
Next.js 16 application running locally or in a controlled environment
vulncheck_xdb
WORKING POC
infoleak
https://github.com/CharlesTheGreat77/CVE-2025-55182-Test-Server
This repository provides a functional exploit PoC for CVE-2025-55182, targeting a vulnerable Next.js 16.0.6 application with App Router/RSC enabled. The exploit leverages a crafted multipart/form-data payload to achieve remote code execution (RCE) via prototype pollution and server-side JavaScript execution.
Classification
Working Poc 95%
Target:
Next.js 16.0.6 (App Router/RSC enabled)
No auth needed
Prerequisites:
Next.js 16.0.6 with App Router/RSC enabled · Network access to the target server
vulncheck_xdb
WORKING POC
remote
https://github.com/ahmedshamsddin/CVE-2025-55182-Exploit
This repository contains a functional exploit for CVE-2025-55182, targeting a vulnerability in React Server Components (RSC) in Next.js 16.0.6. The exploit injects a shell via a crafted multipart/form-data request, leveraging prototype pollution and server-side JavaScript execution to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Next.js 16.0.6
No auth needed
Prerequisites:
Next.js application running on localhost:3000 · Access to the target application
vulncheck_xdb
WORKING POC
remote
https://github.com/l0n3m4n/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting a Next.js RCE vulnerability. The Python script includes WAF bypass techniques, reverse shell capabilities, and async scanning, demonstrating a well-developed proof-of-concept.
Classification
Working Poc 95%
Target:
Next.js
No auth needed
Prerequisites:
Network access to the target Next.js application · Python environment with required dependencies
vulncheck_xdb
WORKING POC
remote
https://github.com/yanoshercohen/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting a deserialization vulnerability in Next.js applications. The exploit leverages a crafted multipart/form-data request to achieve remote code execution (RCE) by injecting malicious JavaScript payloads.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target application must be running a vulnerable version of Next.js · Network access to the target application
vulncheck_xdb
SUSPICIOUS
remote
https://github.com/Lennonxlz/react2shell-ultimate
The repository claims to be a scanner for CVE-2025-66478 but lacks actual exploit code, instead pushing external downloads via GitHub raw links. The README is filled with marketing language and no technical details about the vulnerability.
Classification
Suspicious 95%
Target:
Next.js RSC (React Server Components)
No auth needed
Prerequisites:
None specified