nomisec
WORKING POC
410 stars
by Malayke · poc
https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
This repository contains a scanner and PoC exploits for CVE-2025-66478, a vulnerability in Next.js RSC (React Server Components) that allows remote code execution. The scanner detects vulnerable versions, while the PoC demonstrates RCE via prototype pollution and command injection.
Classification
Working Poc 95%
Target:
Next.js versions affected by CVE-2025-66478
No auth needed
Prerequisites:
Target running vulnerable Next.js version · Network access to the target application
nomisec
SCANNER
405 stars
by vercel-labs · poc
https://github.com/vercel-labs/fix-react2shell-next
This repository contains a scanner tool designed to detect and patch vulnerabilities related to CVE-2025-66478 in Next.js and React RSC applications. It scans package.json files for vulnerable dependencies and applies version updates to mitigate the vulnerability.
Classification
Scanner 100%
Target:
Next.js and React RSC packages (next, react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack)
No auth needed
Prerequisites:
Access to the project directory containing package.json files · Node.js environment to run the scanner
github
SCANNER
311 stars
by emredavut · javascriptpoc
https://github.com/emredavut/CVE-2025-55182
This repository contains a Chrome extension and auxiliary tools designed to detect and fingerprint React Server Components (RSC) and Next.js applications for potential vulnerabilities (CVE-2025-55182 and CVE-2025-66478). It includes passive detection mechanisms and a Shodan scanner but lacks functional exploit code.
Classification
Scanner 90%
Target:
React Server Components (RSC) / Next.js
No auth needed
Prerequisites:
Access to a Chrome browser · Shodan API key for scanning
nomisec
SCANNER
140 stars
by hackersatyamrastogi · poc
https://github.com/hackersatyamrastogi/react2shell-ultimate
This repository contains a Python-based scanner for CVE-2025-66478, a critical RCE vulnerability in Next.js applications using React Server Components (RSC). The tool supports multiple scan modes, including safe detection, RCE proof-of-concept, version detection, and local project scanning, with features like WAF bypass and interactive shell capabilities.
Classification
Scanner 95%
Target:
Next.js applications using React Server Components (RSC)
No auth needed
Prerequisites:
Python 3.8 or higher · Target URL or local Next.js project · Network access to the target
github
WORKING POC
128 stars
by pyroxenites · gopoc
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
This repository contains a functional exploit tool for CVE-2025-55182, targeting Next.js applications with RCE capabilities. It includes multiple exploitation chains, WAF bypass techniques, and payload encryption, along with a GUI for command execution and file management.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Vulnerable Next.js application · Network access to the target
github
WORKING POC
79 stars
by l4rm4nd · javascriptpoc
https://github.com/l4rm4nd/CVE-2025-55182
This repository provides a functional proof-of-concept for CVE-2025-55182, a pre-authentication remote code execution vulnerability in React Server Components and Next.js. It includes a Dockerized vulnerable Next.js application and detection methods using AssetNote's scanner and Nuclei templates.
Classification
Working Poc 95%
Target:
Next.js 16.0.6 with React 19.2.0
No auth needed
Prerequisites:
Docker environment · Network access to the vulnerable application
github
WORKING POC
38 stars
by sumanrox · pythonpoc
https://github.com/sumanrox/rschunter
This repository contains a functional exploit tool for CVE-2025-55182, targeting Next.js React Server Components (RSC) vulnerabilities. It includes multiple strategies for detection and exploitation, such as prototype pollution and WAF bypass techniques, with support for multi-threaded scanning and command execution.
Classification
Working Poc 95%
Target:
Next.js with React Server Components
No auth needed
Prerequisites:
Python 3.6+ · requests library · target running vulnerable Next.js RSC implementation
github
WORKING POC
22 stars
by cybertechajju · pythonpoc
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
This repository contains a comprehensive toolkit for exploiting CVE-2025-55182 and CVE-2025-66478, which are critical RCE vulnerabilities in React Server Components and Next.js. It includes functional exploit code, scanners, and a Burp Suite extension for detection and exploitation.
Classification
Working Poc 95%
Target:
React Server Components (19.0.0, 19.1.0, 19.1.1, 19.2.0), Next.js (15.x, 16.x with App Router)
No auth needed
Prerequisites:
Vulnerable React/Next.js application · Network access to the target
github
SCANNER
11 stars
by BankkRoll · javascriptpoc
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
This repository contains a browser-based scanner for detecting CVE-2025-55182 (React RSC RCE) and CVE-2025-66478 (Next.js RSC RCE) in GitHub repositories. It checks package versions against known vulnerable ranges and provides a detailed report.
Classification
Scanner 95%
Target:
React (19.0.0-19.2.0), Next.js (14.3 canary, 15.x, 16.x)
No auth needed
Prerequisites:
Access to GitHub repositories (public or private with PAT)
nomisec
SCANNER
11 stars
by abtonc · poc
https://github.com/abtonc/next-cve-2025-66478
This repository contains a scanner script to detect Next.js projects vulnerable to CVE-2025-66478 by checking version numbers in various lock files. It does not exploit the vulnerability but identifies affected versions.
Classification
Scanner 95%
Target:
Next.js versions 15.x (excluding patched versions) and 16.x (excluding 16.0.7)
No auth needed
Prerequisites:
Access to the target directory containing Next.js projects
github
WORKING POC
10 stars
by shyambhanushali · pythonpoc
https://github.com/shyambhanushali/React2Shell
This repository contains a functional Python-based exploit for CVE-2025-66478, targeting Next.js applications using React Server Components (RSC). The exploit leverages deserialization flaws to achieve remote code execution (RCE) by crafting malicious payloads sent via HTTP requests.
Classification
Working Poc 95%
Target:
Next.js with React Server Components
No auth needed
Prerequisites:
Target application must be running Next.js with vulnerable RSC implementation · Network access to the target URL
github
SCANNER
9 stars
by shamo0 · poc
https://github.com/shamo0/react2shell-PoC
This repository contains a Nuclei template designed to detect CVE-2025-55182 and CVE-2025-66478, which are vulnerabilities in React Server Components and Next.js allowing unauthenticated Remote Code Execution (RCE) through insecure deserialization. The template sends a crafted HTTP request and checks for specific error responses to identify vulnerable systems.
Classification
Scanner 90%
Target:
React Server Components, Next.js
No auth needed
Prerequisites:
Access to the target server · Target must be running a vulnerable version of React Server Components or Next.js
github
SCANNER
7 stars
by heiheishushu · pythonpoc
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
This repository contains a Python script designed to detect whether a website uses React Server Components (RSC) or Next.js by checking for specific HTML markers, content types, and headers. It does not exploit any vulnerability but scans for features related to CVE-2025-55182 and CVE-2025-66478.
Classification
Scanner 95%
Target:
React Server Components (RSC) and Next.js
No auth needed
Prerequisites:
Network access to the target website
nomisec
SCANNER
5 stars
by abdozkaya · poc
https://github.com/abdozkaya/rsc-security-auditor
This repository is a Next.js-based security scanner for detecting vulnerabilities in React Server Components (RSC) by analyzing package.json files. It checks for specific CVEs (e.g., CVE-2025-66478) and provides remediation guidance.
Classification
Scanner 100%
Target:
Next.js and React Server Components (versions specified in vulnerability-db.ts)
No auth needed
Prerequisites:
Access to a package.json file or GitHub repository URL
github
SCANNER
5 stars
by Security-Phoenix-demo · pythonpoc
https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478
The repository contains a scanner for detecting CVE-2025-66478, a critical RCE vulnerability in React Server Components (RSC) and related frameworks. It includes detailed documentation, version ranges, and detection logic but no functional exploit code.
Classification
Scanner 95%
Target:
React Server Components (RSC) and frameworks like Next.js, React Router, Waku (versions 19.0.0-19.2.0)
No auth needed
Prerequisites:
Vulnerable React/RSC stack (19.0.0-19.2.0) · Network access to target server
github
WORKING POC
5 stars
by pax-k · shellpoc
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
This repository contains a functional exploit script for CVE-2025-55182, a critical pre-authentication RCE vulnerability in React Server Components (RSC) Flight protocol. The exploit leverages insecure deserialization to achieve prototype pollution and arbitrary command execution.
Classification
Working Poc 95%
Target:
React Server Components (RSC) in Next.js and other frameworks using affected React packages (19.0.0-19.2.0)
No auth needed
Prerequisites:
Vulnerable React Server Components implementation · Network access to target
github
SCANNER
5 stars
by nehkark · pythonpoc
https://github.com/nehkark/CVE-2025-55182
This repository contains a passive scanner for detecting Next.js applications vulnerable to React2Shell-style attacks (CVE-2025-55182). It fingerprints Next.js and React Server Components (RSC) and sends a benign React Flight payload to check for vulnerability without executing OS commands.
Classification
Scanner 95%
Target:
Next.js with React Server Components
No auth needed
Prerequisites:
Target URL with Next.js application
github
SCANNER
5 stars
by ZihxS · javascriptpoc
https://github.com/ZihxS/check-react-rce-cve-2025-55182
This repository contains a scanner tool designed to detect vulnerable versions of React and Next.js packages affected by CVE-2025-55182 and CVE-2025-66478. It analyzes project dependencies and codebase structure but does not include exploit code.
Classification
Scanner 95%
Target:
React (19.0.0 < 19.0.1), Next.js (v15.0.x < 15.0.5)
No auth needed
Prerequisites:
Node.js 16+ · Access to project directory
github
WORKING POC
4 stars
by ctkqiang · gopoc
https://github.com/ctkqiang/CVE-Exploits/tree/main/CVE-2025-66478
This repository contains functional exploit code for CVE-2023-21980 (MySQL client library hijacking via UTF-16 path traversal) and CVE-2025-14847 (MongoDB zLib memory leak). The MySQL exploit demonstrates RCE by loading a malicious shared library, while the MongoDB exploit leaks heap memory via crafted OP_COMPRESSED packets.
Classification
Working Poc 95%
Attack Type
Rce, Info Leak
Target:
MySQL client (pre-8.0.33), MongoDB (multiple versions)
No auth needed
Prerequisites:
gcc for compilation · network access to target · MySQL client with vulnerable version · MongoDB with zlib compression enabled
nomisec
WORKING POC
4 stars
by wangxso · poc
https://github.com/wangxso/CVE-2025-66478-POC
This repository contains a functional proof-of-concept exploit for CVE-2025-66478, a critical RCE vulnerability in Next.js applications using React Server Components (RSC) due to insecure deserialization. The exploit includes a script to generate malicious payloads and a Docker environment for safe testing.
Classification
Working Poc 95%
Target:
Next.js 15.x, 16.x, and 14.3.0-canary.77+
No auth needed
Prerequisites:
Target must use Next.js with App Router and RSC · Network access to the target server
github
WORKING POC
3 stars
by chrahman · shellpoc
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
This repository contains a functional exploit script for CVE-2025-55182, a critical RCE vulnerability in React Server Components (RSC) Flight protocol due to insecure deserialization. The script demonstrates prototype pollution leading to arbitrary command execution via crafted HTTP POST requests.
Classification
Working Poc 95%
Target:
React Server Components (RSC) in Next.js and other frameworks using react-server-dom-webpack/parcel/turbopack versions 19.0.0-19.2.0
No auth needed
Prerequisites:
Vulnerable React Server Components implementation · Network access to target server
github
WRITEUP
3 stars
by TheStingR · shellpoc
https://github.com/TheStingR/ReactOOPS-WriteUp
This repository provides a detailed technical writeup and educational materials for CVE-2025-55182 and CVE-2025-66478, focusing on a critical unauthenticated RCE vulnerability in React Server Components and Next.js App Router. It includes exploit scripts derived from the react2shell framework and emphasizes proper attribution to the original author, freeqaz.
Classification
Writeup 95%
Target:
Next.js 16.0.6 with React 19
No auth needed
Prerequisites:
Vulnerable Next.js application · Network access to the target
github
SCANNER
3 stars
by anuththara2007-W · javascriptpoc
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
This repository contains a Chrome extension designed to detect React Server Components (RSC) and Next.js App Router fingerprints through passive and active fingerprinting techniques. It does not exploit CVE-2025-66478 but instead scans for indicators of RSC usage.
Classification
Scanner 90%
Target:
React Server Components (RSC) and Next.js App Router
No auth needed
Prerequisites:
Chrome browser · access to target web pages
nomisec
WORKING POC
3 stars
by strainxx · poc
https://github.com/strainxx/react2shell-honeypot
This repository contains a honeypot designed to detect and log exploitation attempts targeting the React2Shell vulnerability (CVE-2025-66478). It mimics a vulnerable server by responding to specific patterns in POST requests and logging payloads from attackers.
Classification
Working Poc 90%
Target:
React-based applications vulnerable to React2Shell
No auth needed
Prerequisites:
Network access to the honeypot server · Knowledge of React2Shell exploitation patterns
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-66478
This repository contains a functional Go-based exploit for CVE-2025-66478, targeting a Next.js vulnerability. The exploit establishes a connection to the target, extracts an action ID, and executes arbitrary commands via a crafted payload involving prototype pollution and server-side JavaScript injection.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js · Network access to the target
github
SUSPICIOUS
2 stars
by rix4uni · shellpoc
https://github.com/rix4uni/CVE-2025-55182
The repository claims to detect and exploit CVE-2025-55182 and CVE-2025-66478 but provides no actual exploit code, instead directing users to download external scripts via wget. The README is vague and lacks technical details about the vulnerabilities.
Classification
Suspicious 90%
Target:
Next.js applications with React Server Components
No auth needed
Prerequisites:
none specified
github
WORKING POC
2 stars
by RavinduRathnayaka · pythonpoc
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
This repository contains a functional Python-based exploit for CVE-2025-66478, targeting a Next.js RCE vulnerability via prototype pollution in Server Components. The exploit crafts a malicious multipart/form-data payload to execute arbitrary commands on the server.
Classification
Working Poc 95%
Target:
Next.js (specific versions using React Server Components)
No auth needed
Prerequisites:
Python 3.x · requests library · vulnerable Next.js application
github
WORKING POC
2 stars
by C00LN3T · pythonpoc
https://github.com/C00LN3T/React2Shell
The repository contains a Python-based toolkit designed to scan and exploit React/Spring/GraphQL stacks, specifically targeting CVE-2025-55182 and CVE-2025-66478. It includes payloads for command execution via GraphQL and SpEL injection, with features for WAF evasion and endpoint discovery.
Classification
Working Poc 95%
Target:
React/Spring/GraphQL stacks
No auth needed
Prerequisites:
Access to target endpoints · Python 3.8+ environment
nomisec
WRITEUP
2 stars
by ExpTechTW · poc
https://github.com/ExpTechTW/CVE-2025-66478
This repository documents real-world attack logs and malware samples targeting CVE-2025-66478, a Next.js Server Actions RCE vulnerability. It includes analysis of attack patterns, payloads, and mitigation strategies.
Classification
Writeup 95%
Target:
Next.js 15.1.2
No auth needed
Prerequisites:
Exposed Next.js application with vulnerable Server Actions
github
WORKING POC
2 stars
by onlylovetx · pythonpoc
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
This repository contains a functional exploit for CVE-2025-66478, targeting a prototype pollution vulnerability in a Node.js-based web application. The exploit includes both safe checks and RCE payloads, with support for WAF bypass techniques and custom command execution.
Classification
Working Poc 95%
Target:
Node.js web applications (specific framework not explicitly stated)
No auth needed
Prerequisites:
Target application must be vulnerable to prototype pollution · Network access to the target
gitlab
SUSPICIOUS
1 stars
by letchupkt · poc
https://gitlab.com/letchupkt/react2shell
The repository claims to provide an exploit for CVE-2025-66478 but contains obfuscated code with no visible technical details about the vulnerability. The README focuses on features like 'integrity verification' and 'obfuscation' rather than explaining the exploit mechanics.
Classification
Suspicious 90%
Target:
React/Next.js (unspecified version)
No auth needed
Prerequisites:
Python 3 · requests · urllib3
nomisec
SUSPICIOUS
1 stars
by imad457 · poc
https://github.com/imad457/NextJS-RCE-Root-Takeover
The repository claims to provide an RCE exploit for Next.js 16.0.6 but only contains a README with a link to an external PDF report. No actual exploit code or technical details are present.
Classification
Suspicious 90%
Target:
Next.js 16.0.6
No auth needed
nomisec
WORKING POC
1 stars
by khadafigans · poc
https://github.com/khadafigans/React2Shell
This repository contains a Python-based exploit toolkit for CVE-2025-66478, targeting Next.js React Server Components (RSC) prototype pollution combined with a React.lazy gadget chain to achieve remote code execution (RCE). The toolkit includes detection, exploitation, and post-exploitation features such as interactive shell access, file upload, and data exfiltration.
Classification
Working Poc 95%
Target:
Next.js (React Server Components)
No auth needed
Prerequisites:
Vulnerable Next.js application with exposed RSC endpoint · Network access to the target application · Python 3.x with aiohttp library installed
github
WORKING POC
1 stars
by ProwlSec · pythonpoc
https://github.com/ProwlSec/React2Shell
The repository contains a functional exploit for CVE-2025-66478, targeting Next.js applications with React Server Components (RSC) vulnerabilities. The exploit leverages crafted multipart/form-data requests to achieve remote code execution (RCE) via prototype pollution and command injection techniques.
Classification
Working Poc 95%
Target:
Next.js applications with React Server Components
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with RSC enabled · Network access to the target application
github
SCANNER
1 stars
by mounta11n · shellpoc
https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
This repository contains a Bash script that detects the presence of RSC/Next.js RCE vulnerabilities (CVE-2025-55182 and CVE-2025-66478) by sending a crafted HTTP request and checking for specific response signatures (HTTP 500 + digest). It does not exploit the vulnerability but scans for it.
Classification
Scanner 95%
Target:
Next.js with React Server Components (RSC)
No auth needed
Prerequisites:
Target server running vulnerable Next.js version · Network access to the target server
github
WORKING POC
1 stars
by gagaltotal · pythonpoc
https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182, targeting a React/Next.js RCE vulnerability. The exploit uses a crafted multipart/form-data request with a base64-encoded payload to achieve remote code execution.
Classification
Working Poc 90%
Target:
React/Next.js (specific version not specified)
No auth needed
Prerequisites:
Target URL with vulnerable React/Next.js application
github
SCANNER
1 stars
by imbas007 · pythonpoc
https://github.com/imbas007/POC-CVE-2025-55182/tree/main/CVE-2025-66478.yaml
This YAML file is a Nuclei template designed to detect CVE-2025-55182 and CVE-2025-66478, a Remote Code Execution vulnerability in Next.js applications using React Server Components. It sends a crafted multipart/form-data request to trigger the vulnerability and checks for a specific redirect response to confirm exploitation.
Classification
Scanner 90%
Target:
Next.js applications using React Server Components
No auth needed
Prerequisites:
Next.js application with React Server Components enabled
github
SCANNER
1 stars
by arashiyans · pythonpoc
https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478
The repository contains a Python-based scanner for detecting CVE-2025-55182 and CVE-2025-66478, which are vulnerabilities in React Server Components (RSC) and Next.js. The scanner checks for the presence of the vulnerability by sending crafted multipart form data payloads and analyzing responses, but it does not include a full exploit for remote code execution.
Classification
Scanner 95%
Target:
React Server Components (RSC) / Next.js
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js or React Server Components · Network access to the target application
nomisec
WORKING POC
1 stars
by namest504 · poc
https://github.com/namest504/CVE-2025-66478-Exploit-Poc
This repository contains a functional Proof of Concept (PoC) for CVE-2025-66478, a critical Remote Code Execution (RCE) vulnerability in Next.js. The exploit leverages insecure deserialization and prototype pollution in the React Server Components (RSC) Flight protocol to achieve arbitrary command execution on the server.
Classification
Working Poc 95%
Target:
Next.js (versions 15.x, 16.x, and 14.3.0-canary.77 and later)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js with App Router · Network access to the target server
github
WORKING POC
1 stars
by songsanggggg · poc
https://github.com/songsanggggg/CVE-2025-55182
This repository contains a functional proof-of-concept exploit for CVE-2025-55182, demonstrating a remote code execution (RCE) vulnerability in React Server Components. The exploit leverages the `__webpack_require__` function to load arbitrary modules, including `child_process`, to achieve command execution.
Classification
Working Poc 95%
Target:
React Server Components (React Server DOM Webpack)
No auth needed
Prerequisites:
Access to a vulnerable React Server Components endpoint · Ability to send crafted HTTP requests
gitlab
SCANNER
by caovanthanh203 · poc
https://gitlab.com/caovanthanh203/react2shell-scanner-docker
This repository contains a scanner tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using React Server Components. It sends crafted multipart POST requests to test for RCE vulnerabilities and includes features like WAF bypass and safe-check mode.
Classification
Scanner 95%
Target:
Next.js applications using React Server Components
No auth needed
Prerequisites:
Target application must be running a vulnerable version of Next.js with React Server Components
nomisec
SCANNER
by Saied25 · poc
https://github.com/Saied25/fix-react2shell-next
This repository contains a vulnerability scanner tool designed to detect and fix CVE-2025-66478 in Next.js or React RSC applications. It analyzes package.json files for vulnerable dependencies and provides remediation guidance.
Classification
Scanner 90%
Target:
Next.js/React RSC applications with vulnerable dependencies
No auth needed
Prerequisites:
Access to the target project's package.json file · Node.js environment to run the scanner
github
WORKING POC
by wnaspy · pythonpoc
https://github.com/wnaspy/CVE-2025-55182
This repository contains a functional exploit for CVE-2025-55182 and CVE-2025-66478, targeting a prototype pollution vulnerability in a Next.js application to achieve remote code execution (RCE). The exploit crafts a malicious payload to manipulate the `__proto__` chain and execute arbitrary commands via Node.js's `child_process` module.
Classification
Working Poc 95%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Target application running Next.js with vulnerable dependencies · Network access to the target application
github
WORKING POC
by jensnesten · pythonpoc
https://github.com/jensnesten/React2Shell-PoC
This repository contains a functional exploit for CVE-2025-66478, targeting a deserialization vulnerability in React Server Components (RSC) and Next.js applications. The exploit leverages unsafe deserialization in server action handlers to achieve remote code execution via crafted multipart form-data payloads.
Classification
Working Poc 95%
Target:
Next.js and React Server Components (RSC)
No auth needed
Prerequisites:
Vulnerable Next.js/RSC instance · Network access to the target server
nomisec
SCANNER
by NAYLINNU · poc
https://github.com/NAYLINNU/CVE-2025-66478
This YAML file is a Nuclei template designed to detect CVE-2025-66478, a prototype pollution vulnerability in Next.js App Router/React Server Components. It sends a crafted multipart request with a malicious payload and checks for specific error responses indicating the presence of the vulnerability.
Classification
Scanner 90%
Attack Type
Deserialization
Target:
Next.js App Router/React Server Components
No auth needed
Prerequisites:
Access to the target Next.js application
github
SCANNER
by Mustafa1p · pythonpoc
https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478
This repository contains a scanner for detecting CVE-2025-55182 and CVE-2025-66478, which are critical RCE vulnerabilities in Next.js applications using React Server Components. The tool performs triple-layer detection (RCE, Safe, and Vercel WAF bypass payloads) and provides comprehensive reporting.
Classification
Scanner 95%
Target:
Next.js applications with Server Actions enabled
No auth needed
Prerequisites:
Next.js application with React Server Components enabled · Access to RSC endpoints
nomisec
WORKING POC
by zhixiangyao · poc
https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
This repository contains a proof-of-concept exploit for CVE-2025-66478, a critical RCE vulnerability in Next.js due to insecure deserialization and prototype pollution in the RSC Flight protocol. The exploit leverages a crafted payload to achieve arbitrary command execution on affected Next.js servers.
Classification
Working Poc 95%
Target:
Next.js 15.x, 16.x, and 14.3.0-canary.77+
No auth needed
Prerequisites:
Node.js v24+ · Next.js application with App Router
nomisec
WORKING POC
by viperh · poc
https://github.com/viperh/poc-cve-next
This is a Go-based proof-of-concept exploit for CVE-2025-66478, targeting a Next.js vulnerability. It achieves remote code execution (RCE) by injecting a malicious payload into a Next.js server-side action, leveraging prototype pollution and server-side request forgery (SSRF) techniques.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js · Server-side actions must be enabled
nomisec
WORKING POC
by Code42Cate · poc
https://github.com/Code42Cate/nexts-cve-2025-66478-exploit
This repository contains a working proof-of-concept exploit for CVE-2025-66478, targeting a Next.js application. The exploit leverages a prototype pollution or deserialization vulnerability to achieve remote code execution (RCE) via crafted form data submissions.
Classification
Working Poc 95%
Target:
Next.js (version not specified, likely a vulnerable configuration)
No auth needed
Prerequisites:
Access to the target Next.js application · Vulnerable endpoint exposed
nomisec
SCANNER
by changgun-lee · poc
https://github.com/changgun-lee/Next.js-RSC-RCE-Scanner-CVE-2025-66478
This repository contains a scanner for detecting vulnerable Next.js versions affected by CVE-2025-66478, an RCE vulnerability in React Server Components (RSC). The scanner checks the version of Next.js running on a target website and determines if it is vulnerable based on predefined version ranges.
Classification
Scanner 95%
Target:
Next.js (specific versions listed in README)
No auth needed
Prerequisites:
Target URL must be accessible · Playwright and Chromium must be installed
github
WRITEUP
by react2shell-repo-menagerie · typescriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo
The repository appears to be a legitimate writeup or analysis of CVE-2025-66478, containing detailed code and documentation related to the vulnerability. It includes multiple files, primarily in TypeScript, suggesting a technical deep dive into the affected software.
Classification
Writeup 90%
Target:
Dub Technologies software (specific version unclear)
No auth needed
Prerequisites:
Access to the affected software
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces
The repository contains a vulnerable monorepo setup with Next.js and Yarn workspaces but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing vulnerability detection in Yarn workspaces.
Target:
Next.js 15.1.0, React 19.0.0, React DOM 19.0.0
No auth needed
Prerequisites:
Yarn workspaces setup · Next.js and React dependencies
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo
This repository contains a vulnerable monorepo setup with Next.js and Turborepo but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing vulnerability scanners rather than demonstrating an exploit.
Target:
Next.js 15.1.0, React 19.0.0, Turborepo
No auth needed
Prerequisites:
Vulnerable versions of Next.js and React in a Turborepo monorepo
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks
This repository provides a detailed technical analysis of CVE-2025-66478, focusing on the vulnerability's impact on React/Next.js packages within a pnpm monorepo environment. It includes a test setup to demonstrate the vulnerability and highlights challenges for vulnerability scanners in handling pnpm symlinks.
Classification
Writeup 90%
Target:
React/Next.js packages (Next.js 15.1.0, React 19.0.0)
No auth needed
Prerequisites:
pnpm monorepo setup · vulnerable versions of React/Next.js packages
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting
This repository demonstrates a monorepo hoisting issue where a workspace package.json shows a fixed version of a dependency (Next.js 15.1.9) but the root node_modules contains a vulnerable hoisted version (15.1.0). It highlights a fix failure scenario where security tools may incorrectly trust package.json without verifying actual installed versions.
Classification
Writeup 95%
Target:
npm workspaces with hoisting (Next.js 15.1.0)
No auth needed
Prerequisites:
Monorepo setup with npm workspaces · Hoisting enabled · Partial fix applied to package.json without root-level install
github
SCANNER
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides
This repository is a test case designed to verify whether vulnerability scanners properly detect CVE-2025-66478 by checking the `pnpm.overrides` field, which pins a vulnerable version of Next.js (15.1.0) despite the `dependencies` field listing a safe version (15.1.9).
Classification
Scanner 90%
Target:
Next.js 15.1.0
No auth needed
Prerequisites:
pnpm installation · Next.js project setup
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog
This repository demonstrates a vulnerability in pnpm's catalog protocol where scanners may fail to detect vulnerable versions of React/Next.js packages (CVE-2025-66478). It includes a test application and detailed explanation of how the catalog protocol can obscure version resolution.
Classification
Writeup 90%
Target:
pnpm with catalog protocol
No auth needed
Prerequisites:
pnpm project using catalog protocol · vulnerable versions of React/Next.js
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs
This repository provides a detailed technical analysis of CVE-2025-66478, focusing on a vulnerable Next.js setup using Yarn Berry zero-installs. It explains the vulnerability scenario, scanner requirements, and expected behavior for detection and remediation.
Classification
Writeup 95%
Target:
Next.js 15.1.0 with Yarn Berry zero-installs
No auth needed
Prerequisites:
Next.js 15.1.0 installed via Yarn Berry zero-installs · Committed .yarn/cache/ directory
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions
This repository demonstrates a scanner gap test for CVE-2025-66478, highlighting how Yarn's 'resolutions' field can deceptively pin a vulnerable version of Next.js (15.1.0) despite the 'dependencies' field listing a safe version (15.1.9). It serves as a technical analysis of vulnerability detection challenges in dependency management.
Classification
Writeup 95%
Target:
Next.js 15.1.0 (via Yarn resolutions)
No auth needed
Prerequisites:
Yarn package manager · Next.js project with vulnerable resolution configuration
github
SCANNER
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp
This repository is a test environment for detecting CVE-2025-66478 in a Next.js application using Yarn Berry PnP mode. It does not contain exploit code but provides a vulnerable setup to challenge vulnerability scanners.
Classification
Scanner 90%
Target:
Next.js 15.1.0, React 19.0.0, React-DOM 19.0.0
No auth needed
Prerequisites:
Yarn Berry with PnP mode enabled · Vulnerable versions of Next.js, React, and React-DOM
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry
This repository contains a basic Next.js application with vulnerable dependencies but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing vulnerability presence without demonstrating exploitation.
Target:
Next.js 15.1.0, React 19.0.0, ReactDOM 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js, React, and ReactDOM installed
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
This repository contains a basic Next.js application with vulnerable dependencies but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing the vulnerability without demonstrating exploitation.
Target:
Next.js 15.1.0, React 19.0.0, React-DOM 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js, React, and React-DOM installed
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun
This repository contains a basic Next.js application with Bun package manager, but lacks actual exploit code or technical details about CVE-2025-66478. It only provides a test environment with vulnerable dependencies.
Target:
Next.js 15.1.0, React 19.0.0, React-DOM 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js, React, and React-DOM
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix
This repository contains a minimal Next.js application with vulnerable package versions listed but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing version parsing with 'v' prefixes.
Target:
Next.js v15.1.0, React v19.0.0, ReactDOM v19.0.0
No auth needed
Prerequisites:
None
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive
This repository contains a minimal Next.js application with vulnerable dependencies but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing transitive dependency scenarios without demonstrating the vulnerability.
Target:
Next.js 15.1.0, React 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js and React installed
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde
This repository contains a minimal Next.js application with vulnerable package versions but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing the vulnerability without demonstrating exploitation.
Target:
Next.js ~15.1.0, React ~19.0.0, React-DOM ~19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js, React, and React-DOM installed
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest
This repository provides a technical analysis and test application for CVE-2025-66478, focusing on the challenges of scanning npm tag-based dependencies for vulnerabilities. It includes a Next.js application demonstrating how 'latest' tags can lead to inconsistent vulnerability detection.
Classification
Writeup 90%
Target:
Next.js and React (npm tag-based dependencies)
No auth needed
Prerequisites:
npm environment · Next.js/React project with tag-based dependencies
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap
This repository demonstrates a vulnerability in npm-shrinkwrap.json precedence over package-lock.json, leading to the installation of vulnerable versions of React/Next.js packages despite updates in package.json. It highlights a common blind spot in security tooling.
Classification
Writeup 90%
Target:
npm-shrinkwrap.json in Next.js/React projects
No auth needed
Prerequisites:
Presence of npm-shrinkwrap.json in the project · Vulnerable versions of React/Next.js packages
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range
This repository contains a basic Next.js application with vulnerable package versions but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing vulnerability detection tools rather than demonstrating an exploit.
Target:
Next.js (>=15.0.0 <16.0.0), React (>=19.0.0 <20.0.0)
No auth needed
Prerequisites:
Vulnerable versions of Next.js and React installed
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict
This repository provides a detailed technical analysis of CVE-2025-66478, focusing on a peer dependency conflict scenario in Next.js and React. It includes a test case demonstrating how incompatible versions can break the installation process, along with expected behaviors for vulnerability detection and remediation.
Classification
Writeup 90%
Target:
Next.js 15.5.7 with React 17.0.2
No auth needed
Prerequisites:
Next.js and React installed with incompatible versions
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package
This repository contains a basic Next.js application with vulnerable dependencies (Next.js 15.1.0, React 19.0.0) but does not include actual exploit code or a proof-of-concept. It discusses the use of patch-package for local patching and scanner behavior but lacks functional exploit details.
Target:
Next.js 15.1.0, React 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js and React installed
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field
This repository documents a vulnerability in Next.js and React (CVE-2025-66478) related to mismatched package manager configurations, where the `packageManager` field in `package.json` does not align with the actual lockfile used. It provides a test application to demonstrate the issue and explains why this discrepancy occurs.
Classification
Writeup 90%
Target:
Next.js 15.1.0, React 19.0.0, ReactDOM 19.0.0
No auth needed
Prerequisites:
Presence of mismatched `packageManager` field and lockfile in a Next.js/React project
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides
This repository demonstrates a vulnerability scanner gap test for CVE-2025-66478, focusing on how npm 'overrides' can force a vulnerable version of Next.js (15.1.0) despite transitive dependencies declaring a safe version (15.1.9). It highlights the importance of scanners checking the 'overrides' field to detect hidden vulnerabilities.
Classification
Writeup 95%
Target:
Next.js 15.1.0
No auth needed
Prerequisites:
npm project with 'overrides' field · transitive dependency declaring a safe version of Next.js
github
SCANNER
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps
This repository is a test case designed to verify whether vulnerability scanners detect vulnerable packages listed in `optionalDependencies`. It includes a Next.js application with a vulnerable version of `next` (15.1.0) in `optionalDependencies` to highlight scanner gaps.
Classification
Scanner 90%
Target:
Next.js 15.1.0
No auth needed
Prerequisites:
A vulnerability scanner that checks `optionalDependencies`
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile
This repository contains a basic Next.js application with vulnerable dependencies listed but no actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing scenarios without demonstrating the vulnerability.
Target:
Next.js 15.1.0, React 19.0.0, ReactDOM 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js/React installed
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch
This repository demonstrates a vulnerability scenario related to CVE-2025-66478, focusing on a lockfile mismatch issue in Next.js/React applications. It highlights how a lockfile can pin a vulnerable version even after the package.json is updated, leading to a false sense of security.
Classification
Writeup 90%
Target:
Next.js 15.5.7, React 19.0.0, React-DOM 19.0.0
No auth needed
Prerequisites:
Next.js/React application with vulnerable dependencies · Lockfile pinning an older vulnerable version
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep
This repository is a technical analysis and test case for CVE-2025-66478, focusing on vulnerability scanner gaps in detecting transitive dependencies via Git URL dependencies in Next.js applications. It provides detailed documentation on the issue, expected scanner behavior, and test scenarios without containing actual exploit code.
Classification
Writeup 90%
Target:
Next.js applications with Git URL dependencies
No auth needed
Prerequisites:
Next.js application with Git URL dependencies · Vulnerability scanner
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps
This repository contains a basic Next.js application with vulnerable package versions listed but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing vulnerability detection tools.
Target:
Next.js 15.1.0, React 19.0.0, React DOM 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js, React, and React DOM installed
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret
This repository contains a minimal Next.js application with vulnerable package versions but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing vulnerability detection rather than demonstrating exploitation.
Target:
Next.js 15.1.0, React 19.0.0, React-DOM 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js, React, and React-DOM installed
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x
This repository provides a detailed technical analysis of CVE-2025-66478, focusing on version-specific vulnerabilities in Next.js 16.x canary releases. It includes a test application to verify scanner accuracy for canary version patching.
Classification
Writeup 90%
Target:
Next.js 16.x canary versions (16.0.0-canary.10 and earlier)
No auth needed
Prerequisites:
Next.js 16.x canary environment
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x
This repository contains a basic Next.js application with vulnerable package versions but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing the vulnerability without demonstrating exploitation.
Target:
Next.js 15.6.0-canary.50, React 19.0.0, React-DOM 19.0.0
No auth needed
Prerequisites:
Next.js 15.x canary environment
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x
This repository provides a detailed analysis of CVE-2025-66478, focusing on a special case in Next.js 14.x canary versions where no forward-compatible patch exists. It includes version matrices, remediation options, and setup instructions for testing.
Classification
Writeup 90%
Target:
Next.js 14.3.0-canary.77+
No auth needed
Prerequisites:
Next.js 14.3.0-canary.77+ environment
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata
This repository provides a detailed technical analysis of CVE-2025-66478, focusing on SemVer build metadata parsing vulnerabilities in React/Next.js. It includes a test application demonstrating how build metadata (e.g., +build.123) is incorrectly handled, leading to potential version comparison issues.
Classification
Writeup 90%
Target:
Next.js 15.1.0+build.123, React 19.0.0
No auth needed
Prerequisites:
Next.js/React application with vulnerable version parsing logic
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias
This repository contains a basic Next.js application with vulnerable package versions listed but lacks actual exploit code or technical details demonstrating CVE-2025-66478. It serves as a placeholder for testing vulnerability detection rather than a functional PoC.
Target:
Next.js 15.1.0, React 19.0.0, React-DOM 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js, React, and React-DOM installed
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
This repository contains a basic Next.js application with vulnerable dependencies but lacks actual exploit code or technical details about CVE-2025-66478. It serves as a placeholder for testing the vulnerability without demonstrating exploitation.
Target:
Next.js 15.1.0, React 19.0.0, React-DOM 19.0.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js, React, and React-DOM installed
github
WRITEUP
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions
This repository demonstrates a vulnerability in npm workspaces where security scanners using `--depth=0` miss nested vulnerable versions in workspace subdirectories. It highlights how a vulnerable Next.js version (15.1.0) can be overlooked while a safe version (15.5.7) is detected at the root level.
Classification
Writeup 95%
Target:
npm workspaces with nested node_modules
No auth needed
Prerequisites:
npm workspaces with nested dependencies · security scanners using shallow depth checks
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack
The repository contains a minimal test case for CVE-2025-66478 but lacks functional exploit code. It includes a README with vulnerability details and a placeholder JavaScript file that does not demonstrate exploitation.
Target:
react-server-dom-webpack (versions 19.0.0, 19.1.0, 19.1.1, 19.2.0)
No auth needed
Prerequisites:
Vulnerable versions of react-server-dom-webpack installed
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
This repository contains a monorepo setup with Next.js and React but lacks actual exploit code or technical details about CVE-2025-66478. It only provides a basic test application structure without demonstrating the vulnerability.
Target:
React/Next.js (versions 19.0.0 and 15.1.0)
No auth needed
Prerequisites:
npm workspaces monorepo setup
github
STUB
by react2shell-repo-menagerie · javascriptpoc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm
This repository contains a monorepo setup with Next.js and React versions listed as vulnerable to CVE-2025-66478, but it lacks any actual exploit code or technical details about the vulnerability itself. It only provides a basic test application structure.
Target:
Next.js 15.1.0, React 19.0.0
No auth needed
Prerequisites:
None specified
github
SCANNER
by MoisesTapia · luapoc
https://github.com/MoisesTapia/http-react2shell
This repository contains an Nmap NSE script for detecting CVE-2025-55182 and CVE-2025-66478 in React Server Components and Next.js applications. It uses a side-channel technique to identify vulnerable endpoints by analyzing server responses to malformed React Flight payloads.
Classification
Scanner 100%
Target:
React Server Components, Next.js
No auth needed
Prerequisites:
Nmap with NSE support · Network access to target
nomisec
WORKING POC
by Letalandroid · poc
https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable
This repository contains a proof-of-concept for CVE-2025-66478, demonstrating a prototype pollution vulnerability in Next.js 16 that leads to remote code execution (RCE). The PoC includes a malicious multipart/form-data request that exploits the vulnerability to execute arbitrary commands via `child_process.execSync`.
Classification
Working Poc 95%
Target:
Next.js 16
No auth needed
Prerequisites:
A vulnerable Next.js 16 application running on the target server
nomisec
WORKING POC
by abhirajranjan · poc
https://github.com/abhirajranjan/cve-2025-66478
This repository provides a minimal intentionally vulnerable Next.js environment to test security scanners against CVE-2025-55182, a critical RCE vulnerability affecting React Server Components and Next.js. It includes a working exploit PoC that demonstrates command execution via a crafted HTTP POST request.
Classification
Working Poc 95%
Target:
Next.js 16.0.6, React 19.2.0, React-DOM 19.2.0
No auth needed
Prerequisites:
Vulnerable versions of Next.js, React, and React-DOM · Network access to the target application
github
WORKING POC
by lincemorado97 · pythonpoc
https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478
The repository contains a functional Python exploit for CVE-2025-55182, targeting a deserialization vulnerability in React Server Components (Next.js 16.x / React 19.x). The exploit manipulates the Chunk object's `then` property and leverages the `RESOLVED_MODEL` status to achieve remote code execution via crafted Blob deserialization.
Classification
Working Poc 95%
Target:
Next.js 16.x / React 19.x (App Router)
No auth needed
Prerequisites:
Vulnerable Next.js/React application with App Router enabled · Network access to the target server
nomisec
WORKING POC
by Rhyru9 · poc
https://github.com/Rhyru9/CVE-2025-66478
This PoC demonstrates a prototype pollution vulnerability in Next.js leading to RCE via malicious form-data payloads. The exploit leverages JavaScript prototype manipulation to execute arbitrary commands through Node.js child_process.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Exposed Next.js server with vulnerable endpoint · Network access to target
nomisec
SCANNER
by Jibaru · poc
https://github.com/Jibaru/CVE-2025-66478-github-patcher
This repository contains a Go-based automation tool designed to scan GitHub repositories for vulnerable Next.js versions (CVE-2025-66478) and automatically create pull requests with security patches. It uses the GitHub CLI and SemVer logic to detect and fix vulnerable dependencies in package.json files.
Classification
Scanner 95%
Target:
Next.js versions 15.x and 16.x
Auth required
Prerequisites:
Go 1.20+ · Git with SSH configured · GitHub CLI authenticated
nomisec
WORKING POC
by aiexz · poc
https://github.com/aiexz/CVE-2025-66478-kinda-waf
This repository provides a proof-of-concept for CVE-2025-66478, which appears to target a vulnerability in Next.js applications. The PoC includes both a Python script and a JavaScript snippet designed to test and mitigate the vulnerability by injecting a WAF-like protection mechanism.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to send HTTP requests to the target
github
WORKING POC
by StillSoul · pythonpoc
https://github.com/StillSoul/CVE-2025-55182
This repository contains a functional Python-based exploit for CVE-2025-55182, a critical pre-authentication RCE vulnerability in React Server Components (RSC) due to unsafe deserialization in the Flight Protocol. The PoC leverages prototype pollution to achieve remote command execution via crafted multipart/form-data payloads.
Classification
Working Poc 95%
Target:
React Server Components (react-server-dom-*) versions 19.0.0-19.2.0, Next.js 15.x and 16.x (pre-16.0.7)
No auth needed
Prerequisites:
Target must be running vulnerable versions of React Server Components or Next.js · Network access to the target server
nomisec
SCANNER
by mattcbarrett · poc
https://github.com/mattcbarrett/check-cve-2025-66478
This repository contains a bash script that checks for the presence of CVE-2025-66478 in NextJS servers by sending a crafted HTTP request and analyzing the response for a specific vulnerability indicator.
Classification
Scanner 90%
Target:
NextJS server
No auth needed
Prerequisites:
Access to the target NextJS server URL
metasploit
WORKING POC
EXCELLENT
by Maksim Rogov · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/react2shell_unauth_rce_cve_2025_55182.rb
This Metasploit module exploits CVE-2025-55182, an unauthenticated RCE vulnerability in React Server Components (RSC) Flight protocol via prototype pollution during deserialization. It supports multiple frameworks (Next.js, Waku) and delivers payloads through crafted multipart requests.
Classification
Working Poc 100%
Target:
React Server Components (Next.js, Waku)
No auth needed
Prerequisites:
Target running vulnerable React Server Components (Next.js or Waku) · Network access to the target