# N/A
## 概述
React Server Components 中存在一个**预认证远程代码执行(RCE)漏洞**,影响多个版本的特定开发工具包。
## 影响版本
受影响的版本包括:
- `react-server-dom-parcel`
- `react-server-dom-turbopack`
- `react-server-dom-webpack`
在以下 React 版本中存在该漏洞:
- 19.0.0
- 19.1.0
- 19.1.1
- 19.2.0
## 漏洞细节
漏洞出现在 Server Function 端点对 HTTP 请求中的 payload 进行**不安全的反序列化**操作,而无需任何身份验证即可触发。
## 漏洞影响
攻击者可利用该漏洞在目标服务器上**远程执行任意代码**,从而完全控制受影响的服务。由于该漏洞存在于预认证阶段,**无需任何身份验证**即可利用。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | React Server Components 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack contain a remote code execution caused by unsafe deserialization of payloads from HTTP requests to Server Function endpoints, letting unauthenticated attackers execute arbitrary code remotely, exploit requires no authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-55182.yaml | POC详情 |
| 2 | Script to quick check CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Critical unauthenticated RCE vulnerabilities in the React Server Components (RSC) “Flight” protocol. | https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js | POC详情 |
| 3 | CVE-2025-55182 POC | https://github.com/ejpir/CVE-2025-55182-research | POC详情 |
| 4 | CVE-2025-55182 - React Server Components RCE Exploit & Scanner Supports external servers and CLI interface | https://github.com/sickwell/CVE-2025-55182 | POC详情 |
| 5 | A non-intrusive surface scanner for CVE-2025-55182 (React Server Components RCE). Detects exposed RSC endpoints in React 19 and Next.js applications | https://github.com/fatguru/CVE-2025-55182-scanner | POC详情 |
| 6 | CVE-2025-55182 | https://github.com/Ashwesker/Blackash-CVE-2025-55182 | POC详情 |
| 7 | CVE-2025-55182 - React Server Components RCE Exploit & Scanner Supports external servers and CLI interface | https://github.com/atastycookie/CVE-2025-55182 | POC详情 |
| 8 | None | https://github.com/santihabib/CVE-2025-55182-analysis | POC详情 |
| 9 | None | https://github.com/xkillbit/cve-2025-55182-scanner | POC详情 |
| 10 | Testing the React Server Components RCE (CVE-2025-55182) | https://github.com/rpjboyarski/java4script | POC详情 |
| 11 | React2Shell Proof of Concept | https://github.com/whiteov3rflow/CVE-2025-55182-poc | POC详情 |
| 12 | This POC demonstrates CVE-2025-55182 using actual `react-server-dom-webpack@19.0.0` vulnerable code. | https://github.com/Pa2sw0rd/exploit-CVE-2025-55182-poc | POC详情 |
| 13 | CVE-2025-55182 | https://github.com/kk12-30/CVE-2025-55182 | POC详情 |
| 14 | For CVE-2025-55182 and CVE-2025-66478 Security Response | https://github.com/heiheishushu/rsc_detect_CVE-2025-55182 | POC详情 |
| 15 | CVE-2025-55182 漏洞利用GUI,PoC / Exploit for CVE-2025-55182 & CVE-2025-66478 | https://github.com/songsanggggg/CVE-2025-55182 | POC详情 |
| 16 | 检测针对 CVE-2025-55182(React 服务器组件远程代码执行漏洞)的扫描器 | https://github.com/M0onPu15e/next.js-scanner | POC详情 |
| 17 | a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic "Lab Environment" to safely test and understand the vulnerability. | https://github.com/ThemeHackers/CVE-2025-55182 | POC详情 |
| 18 | a realistic POC demonstrating the missing `hasOwnProperty` check in react-server-dom-webpack@19.0.0 | https://github.com/joshterrill/CVE-2025-55182-realistic-poc | POC详情 |
| 19 | A Comprehensive CVE-2025-55182 Detection and Security Assessment Tool | https://github.com/mingyisecurity-lab/CVE-2025-55182-TOOLS | POC详情 |
| 20 | High-performance exploitation engine for CVE-2025-55182 (React Server Components RCE) | https://github.com/joaonevess/rust-flight | POC详情 |
| 21 | Security scanner for CVE-2025-55182 - Critical RCE vulnerability in React Server Components. Scan npm/pnpm/yarn lockfiles, Docker images, SBOMs, and live URLs. Auto-fix, SARIF output, GitHub Actions, Vercel integration, and runtime protection middleware. | https://github.com/gensecaihq/react2shell-scanner | POC详情 |
| 22 | None | https://github.com/sudo-Yangziran/CVE-2025-55182POC | POC详情 |
| 23 | 一款针对 CVE-2025-55182 的独立安全评估工具,基于 Go 开发,提供图形化界面(GUI),用于快速完成漏洞检测与验证。 | https://github.com/Rsatan/CVE-2025-55182-Tools | POC详情 |
| 24 | High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) | https://github.com/assetnote/react2shell-scanner | POC详情 |
| 25 | RCE Auto exploit for CVE-2025-55182 | https://github.com/jf0x3a/CVE-2025-55182-exploit | POC详情 |
| 26 | React/Next.js RCE CVE-2025-55182 checker | https://github.com/aspen-labs/CVE-2025-55182-checker | POC详情 |
| 27 | None | https://github.com/dissy123/cve-2025-55182 | POC详情 |
| 28 | Pre-auth RCE in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. | https://github.com/dwisiswant0/CVE-2025-55182 | POC详情 |
| 29 | See if your endpoint could be vulnerable. | https://github.com/Chelsea486MHz/CVE-2025-55182-test | POC详情 |
| 30 | None | https://github.com/oways/React2shell-CVE-2025-55182-checker | POC详情 |
| 31 | Explanation and full RCE PoC for CVE-2025-55182 | https://github.com/msanft/CVE-2025-55182 | POC详情 |
| 32 | CVE-2025-55182 Fix for Vibe Coders | https://github.com/ivaavimusic/React19-fix-vibecoders | POC详情 |
| 33 | a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic "Lab Environment" to safely test and understand the vulnerability. | https://github.com/carlosaruy/CVE-2025-55182 | POC详情 |
| 34 | Scanner for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Track and remediate a critical React Server Components (RSC) / Flight protocol vulnerability campaign impacting react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack, and RSC-enabled frameworks like Next.js. | https://github.com/Security-Phoenix-demo/freight-night-rce-react-next-CVE-2025-55182-CVE-2025-66478 | POC详情 |
| 35 | some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182 | https://github.com/c0rydoras/CVE-2025-55182 | POC详情 |
| 36 | React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478) | https://github.com/CymulateResearch/React2Shell-Scanner | POC详情 |
| 37 | None | https://github.com/0xPThree/cve-2025-55182 | POC详情 |
| 38 | Vulnerable Docker environment for reproducing CVE-2025-55182. | https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab | POC详情 |
| 39 | Actual CVE-2025-55182 detection and exploit. No bullshit LLMs. | https://github.com/acheong08/CVE-2025-55182-poc | POC详情 |
| 40 | Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3. | https://github.com/jctommasi/react2shellVulnApp | POC详情 |
| 41 | Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478) | https://github.com/shamo0/react2shell-PoC | POC详情 |
| 42 | Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages) | https://github.com/EynaExp/CVE-2025-55182-POC | POC详情 |
| 43 | Unified Security Research Tool | https://github.com/im-hanzou/CVE-2025-55182-POC-SCANNER | POC详情 |
| 44 | None | https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive | POC详情 |
| 45 | Vulnerable REACT app in docker container and poc code - for demos | https://github.com/ps-interactive/cve-2025-55182 | POC详情 |
| 46 | Burp Suite extension to detect the Next.js / React Server Components (RSC) Remote Code Execution vulnerability (CVE-2025-55182 & CVE-2025-66478). | https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension | POC详情 |
| 47 | Functional Python POC to test if servers are vulnerable to CVE-2025-55182 | https://github.com/aquinn-r7/CVE-2025-55182-VulnCheckPOC | POC详情 |
| 48 | PoC CVE-2025-55182 | https://github.com/MedusaSH/POC-CVE-2025-55182 | POC详情 |
| 49 | None | https://github.com/marginaldeer/CVE-2025-55182_scanner | POC详情 |
| 50 | Community tool to detect and remediate CVE-2025-55182 (React2Shell) - Critical RCE vulnerability in React Server Components | https://github.com/nxgn-kd01/cve-2025-55182-scanner | POC详情 |
| 51 | None | https://github.com/clevernyyyy/CVE-2025-55182-Dockerized | POC详情 |
| 52 | A proof of concept exploit script for CVE-2025-55182 | https://github.com/Cillian-Collins/CVE-2025-55182 | POC详情 |
| 53 | Security scanner to detect CVE-2025-55182 & CVE-2025-66478 vulnerabilities in React Server Components (RSC) projects | https://github.com/ZihxS/check-react-rce-cve-2025-55182 | POC详情 |
| 54 | https://github.com/vulhub/vulhub/blob/master/react/CVE-2025-55182/README.md | POC详情 | |
| 55 | None | https://github.com/ducducuc111/CVE-2025-55182-poc | POC详情 |
| 56 | Scanner for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Track and remediate a critical React Server Components (RSC) / Flight protocol vulnerability campaign impacting react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack, and RSC-enabled frameworks like Next.js. | https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478 | POC详情 |
| 57 | Community tool to detect and remediate CVE-2025-55182 (React2Shell) - Critical RCE vulnerability in React Server Components | https://github.com/nxgn-kd01/react2shell-scanner | POC详情 |
| 58 | None | https://github.com/tlfyyds/cve-2025-55182-getshell | POC详情 |
| 59 | None | https://github.com/ZemarKhos/CVE-2025-55182-Exploit-PoC-Scanner | POC详情 |
| 60 | None | https://github.com/sherlocksecurity/CVE-2025-55182-Exploit-scanner | POC详情 |
| 61 | This is a POC script for CVE-2025-55182 (React SSR RCE) | https://github.com/Darker-Ink/react-ssr-vulnerability | POC详情 |
| 62 | POC for CVE-2025-55182 | https://github.com/emadshanab/POC-for-CVE-2025-55182 | POC详情 |
| 63 | None | https://github.com/topstar88/CVE-2025-55182 | POC详情 |
| 64 | None | https://github.com/selectarget/CVE-2025-55182-Exploit | POC详情 |
| 65 | None | https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI | POC详情 |
| 66 | Exploit for CVE-2025-55182 & CVE-2025-66478 | https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool | POC详情 |
| 67 | None | https://github.com/TH-SecForge/CVE-2025-55182 | POC详情 |
| 68 | Next.js React Server Components RCE exploit for CVE-2025-55182 | https://github.com/Chocapikk/CVE-2025-55182 | POC详情 |
| 69 | Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182. | https://github.com/mrknow001/RSC_Detector | POC详情 |
| 70 | CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool | https://github.com/Spritualkb/CVE-2025-55182-exp | POC详情 |
| 71 | None | https://github.com/younesZdDz/CVE-2025-55182 | POC详情 |
| 72 | Original Proof-of-Concept's for React2Shell CVE-2025-55182 | https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc | POC详情 |
| 73 | None | https://github.com/hualy13/CVE-2025-55182 | POC详情 |
| 74 | Interactive shell (HTTP hijack + POST + AES-256-CBC/BASE64) | https://github.com/RuoJi6/CVE-2025-55182-RCE-shell | POC详情 |
| 75 | A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications | https://github.com/Saturate/CVE-2025-55182-Scanner | POC详情 |
| 76 | None | https://github.com/hoosin/CVE-2025-55182 | POC详情 |
| 77 | 基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件 | https://github.com/Pizz33/CVE-2025-55182-burpscanner | POC详情 |
| 78 | lab_demo CVE-2025-55182 | https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182 | POC详情 |
| 79 | Real-world attack analysis of CVE-2025-55182 (React2Shell) - React Server Components RCE vulnerability | https://github.com/ngvcanh/CVE-2025-55182-Attack-Analysis | POC详情 |
| 80 | Working proof of concept for NextJS RCE to establish a reverse shell. [React2Shell] | https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS | POC详情 |
| 81 | "One crafted HTTP request can compromise your entire server." — React Security Team, Dec 2025 | https://github.com/logesh-GIT001/CVE-2025-55182 | POC详情 |
| 82 | An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc | https://github.com/freeqaz/react2shell | POC详情 |
| 83 | CVE-2025-55182 | https://github.com/m3m0ryc0rrupt/CVE-2025-55182-PoC | POC详情 |
| 84 | A containerized testing environment for CVE-2025-55182, a critical (10.0 CVSS) Remote Code Execution vulnerability in React Server Components. | https://github.com/ABCFabian/React2Shell-CVE-2025-55182-Testing-Environment | POC详情 |
| 85 | None | https://github.com/nanwinata/CVE-2025-55182-Scanner | POC详情 |
| 86 | Docker poc lab for CVE-2025-55182 detection and exploitation | https://github.com/l4rm4nd/CVE-2025-55182 | POC详情 |
| 87 | 浅谈React Server Components RCE 漏洞分析 | https://github.com/Airis101/CVE-2025-55182-analysis | POC详情 |
| 88 | React Server Components 远程代码执行漏洞(CVE-2025-55182) | https://github.com/GelukCrab/React-Server-Components-RCE | POC详情 |
| 89 | Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security | https://github.com/Golden-Secure/CVE-2025-55182 | POC详情 |
| 90 | 研究CVE-2025-55182全版本利用漏洞 | https://github.com/XiaomingX/CVE-2025-55182-poc | POC详情 |
| 91 | None | https://github.com/alexandre-briongos-wavestone/react-cve-2025-55182-lab | POC详情 |
| 92 | This repository documents research into deserialization behavior within Next.js React Server Components (RSC) using the Flight protocol. It focuses on how malformed multipart bodies combined with Server Action request handling can lead to prototype traversal and execution primitives on certain builds. | https://github.com/Rat5ak/CVE-2025-55182-React2Shell-RCE-POC | POC详情 |
| 93 | React2Shell | CVE-2025-55182 - React Server Components RCE | https://github.com/RajChowdhury240/React2Shell-CVE-2025-55182 | POC详情 |
| 94 | PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) | https://github.com/nehkark/CVE-2025-55182 | POC详情 |
| 95 | None | https://github.com/prestonhashworth/cve-2025-55182 | POC详情 |
| 96 | POC for CVE-2025-55182 React2Shell | https://github.com/nomorebreach/POC-CVE-2025-55182 | POC详情 |
| 97 | Host-based detection rules for the RCE vulnerability in the React JavaScript framework. | https://github.com/nerium-security/CVE-2025-55182 | POC详情 |
| 98 | CVE-2025-55182复现环境及RCE回显poc | https://github.com/zzhorc/CVE-2025-55182 | POC详情 |
| 99 | nmap nse for detecting React2Shell (CVE-2025-55182) | https://github.com/Atlantis02-sec/Vulnerability-assessment | POC详情 |
| 100 | Proof-of-Concept RCE pour CVE‑2025‑55182 exploitant le protocole React Flight sur Next.js App Router. | https://github.com/rl0x01/CVE-2025-55182_PoC | POC详情 |
| 101 | React2Shell (CVE-2025-55182) – An intentionally vulnerable Next.js application created for educational and research purposes. | https://github.com/subzer0x0/React2Shell | POC详情 |
| 102 | Security scanner for CVE-2025-55182 - Critical RCE vulnerability in React Server Components | https://github.com/f0xyx/CVE-2025-55182-Scanner | POC详情 |
| 103 | 使用burp自动检测CVE-2025-55182 Next.js RCE 漏洞 | https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension- | POC详情 |
| 104 | Proof of Concept for React2Shell vulnerability | https://github.com/ceortiz33/CVE-2025-55182 | POC详情 |
| 105 | PoC for React2Shell (CVE-2025-55182) | https://github.com/sh1ro8/react2shell | POC详情 |
| 106 | Show case CVE-2025-55182 POC in Typrescript/Javascript | https://github.com/zessu/CVE-2025-55182-Typescript | POC详情 |
| 107 | A web-based vulnerability scanner for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components. | https://github.com/mxm0z/r2s | POC详情 |
| 108 | CVE-2025-55182 Interactive PoC - React Server Components RCE - Educational Security Research | https://github.com/NathanJ60/react2shell-interactive | POC详情 |
| 109 | None | https://github.com/GarethMSheldon/React2Shell-CVE-2025-55182-Detector | POC详情 |
| 110 | CVE-2025-55182 React2Shell PoC lab | https://github.com/alsaut1/react2shell-lab | POC详情 |
| 111 | React2Shell vulnerability (CVE-2025-55182 / CVE-2025-66478) | https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script | POC详情 |
| 112 | This repository contains a proof-of-concept demonstration of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. | https://github.com/kOaDT/poc-cve-2025-55182 | POC详情 |
| 113 | None | https://github.com/StealthMoud/CVE-2025-55182-Scanner | POC详情 |
| 114 | CVE-2025-55182 Exploit | https://github.com/yanoshercohen/CVE-2025-55182 | POC详情 |
| 115 | None | https://github.com/klassiker/CVE-2025-55182 | POC详情 |
| 116 | Lightweight scanner and Nuclei templates for identifying React and Next.js deserialization RCEs (CVE-2025-55182 / CVE-2025-66478). | https://github.com/grp-ops/react2shell | POC详情 |
| 117 | PoC for React2Shell (CVE-2025-55182) | https://github.com/xkey8/react2shell | POC详情 |
| 118 | None | https://github.com/kindone09/CVE-2025-55182 | POC详情 |
| 119 | this repo have CVE-2025-55182 full exploit with RCE | https://github.com/mohit121312/CVE-2025-55182_full_exploit | POC详情 |
| 120 | React2Shell (CVE-2025-55182) Exploit | https://github.com/yanoshercohen/React2Shell_CVE-2025-55182 | POC详情 |
| 121 | RSC/Next.js RCE Vulnerability Detector & PoC Chrome Extension – CVE-2025-55182 & CVE-2025-66478 | https://github.com/emredavut/CVE-2025-55182 | POC详情 |
| 122 | None | https://github.com/fankh/cve-2025-55182-test-lab-windows | POC详情 |
| 123 | Fast scanner for detecting and confirming Next.js RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478). | https://github.com/cypholab/evilact | POC详情 |
| 124 | None | https://github.com/shren207/CVE-2025-55182 | POC详情 |
| 125 | Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478 | https://github.com/sumanrox/rschunter | POC详情 |
| 126 | CVE-2025-55182 & CVE-2025-66478 proof of concepts | https://github.com/ayoub-intigriti/react2shell-cve | POC详情 |
| 127 | None | https://github.com/zorejt/Rust_CVE-2025-55182 | POC详情 |
| 128 | A critical-severity vulnerability in React Server Components (CVE-2025-55182) affects React 19 and frameworks that use it, including Next.js (CVE-2025-66478) | https://github.com/StillSoul/CVE-2025-55182 | POC详情 |
| 129 | None | https://github.com/MaxK9999/CVE-2025-55182 | POC详情 |
| 130 | CVE-2025-55182 poc | https://github.com/Archerkong/CVE-2025-55182 | POC详情 |
| 131 | chrome extension to detect next.js sites vulnerable to CVE-2025-55182 (react2shell) | https://github.com/philparzer/nextjs-react2shell-detect | POC详情 |
| 132 | None | https://github.com/Kryptopacy/Next.js-RCE-Patcher--CVE-2025-55182- | POC详情 |
| 133 | Meow | https://github.com/yunaranyancat/CVE-2025-55182-NSE | POC详情 |
| 134 | This is a POC for testing your projects that are vulnerable to CVE-2025-55182 with a terminal and ability to scan a list | https://github.com/MrSol0/CVE-2025-55182-Terminal | POC详情 |
| 135 | A test server for demonstrating and testing React2Shell (CVE-2025-55182) vulnerability | https://github.com/fullhunt/react2shell-test-server | POC详情 |
| 136 | None | https://github.com/zack0x01/vuln-app-CVE-2025-55182 | POC详情 |
| 137 | None | https://github.com/zack0x01/CVE-2025-55182-advanced-scanner- | POC详情 |
| 138 | AWS Organization-wide detection toolkit for CVE-2025-55182 & CVE-2025-66478 (React Server Components / Next.js RCE vulnerabilities) | https://github.com/rocklambros/React2Shell_Hunter | POC详情 |
| 139 | CVE-2025-55182 & CVE-2025-66478 Detection Tool for Next.js RSC RCE | https://github.com/alessiodos/react2shell-scanner | POC详情 |
| 140 | Patches CVE-2025-55182 in your repositories | https://github.com/Bashamega/react-CVE-2025-55182-fixer | POC详情 |
| 141 | More exploit-focused; great for security research repos. | https://github.com/orgito1015/CVE-2025-55182-RCE-Exploit | POC详情 |
| 142 | CVE-2025-55182 React Server Components RCE - Go PoC | https://github.com/keklick1337/CVE-2025-55182-golang-PoC | POC详情 |
| 143 | React2Shell-Exploit — Complete exploitation framework for CVE-2025-55182, including Python exploit, Docker vulnerable lab, Burp Suite manual and automated exploitation, Nuclei detection template, and validated testing workflow. Developed for penetration testing and educational research. | https://github.com/rubensuxo-eh/react2shell-exploit | POC详情 |
| 144 | CVE-2025-55182 RCE - Massive Scanner POC | https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182 | POC详情 |
| 145 | Detects exposed React Server Components vulnerable to CVE-2025-55182 via RSC negotiation. | https://github.com/w3irdo21/CVE-2025-55182-react2shell | POC详情 |
| 146 | RCE exploitation tool targeting CVE-2025-55182, a critical vulnerability in React Server Components (RSC) affecting React 19.0.0 - 19.2.0 and Next.js applications. | https://github.com/Hghost0x00/CVE-2025-55182 | POC详情 |
| 147 | Advanced security testing tool for CVE-2025-55182 vulnerability assessment in Next.js applications. Features interactive shell, batch scanning, WAF bypass, and comprehensive reporting. | https://github.com/zamdevio/r2s | POC详情 |
| 148 | React2Shell, CVE-2025-55182, RCE Vulnerability: A critical breakdown of the unsafe deserialization flaw in React Server Components that enables unauthenticated remote code execution across default React/Next.js setups. | https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web | POC详情 |
| 149 | Poc for CVE-2025-55182 | https://github.com/0xN7y/CVE-2025-55182 | POC详情 |
| 150 | React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0, including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack, contain a remote code execution vulnerability. | https://github.com/MuhammadWaseem29/React2Shell_Rce-cve-2025-55182 | POC详情 |
| 151 | CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner) | https://github.com/l0n3m4n/CVE-2025-55182 | POC详情 |
| 152 | React Shell & Next.js RSC Exploit Tool (CVE-2025-55182) | https://github.com/ynsmroztas/NextRce | POC详情 |
| 153 | A minimal RCE PoC for CVE-2025-55182 | https://github.com/shreyas-malhotra/React2Shell-CVE-2025-55182 | POC详情 |
| 154 | CVE-2025-55182 PoC Exploit | https://github.com/sohaibeb/CVE-2025-55182 | POC详情 |
| 155 | 🛡️ Complete toolset for detecting and patching CVE-2025-55182 (React2Shell) - A critical CVSS 10.0 RCE vulnerability in React Server Components. Includes automated scanner, patcher, and MCP server integration. | https://github.com/hlsitechio/cve-2025-55182-tools | POC详情 |
| 156 | This is a fast, asynchronous Python tool that fingerprints domains for likely Next.js App Router / React Server Components (RSC) infrastructure. (I made it to find the applications possibly vulnerable to CVE-2025-55182 and CVE-2025-66478) | https://github.com/vyvivekyadav04/RSC-Infra-Scanner | POC详情 |
| 157 | A modified and a little boosted exploit for CVE-2025-55182, React2Shell: Pre-authentication Remote Code Execution in React Server Packages | https://github.com/MikeTheHash/CVE-2025-55182 | POC详情 |
| 158 | Multi-language security scanner with 64 analyzers + AI Agent Security. NEW: React2Shell CVE-2025-55182 detection (CVSS 10.0). Scan Python, JS, Go, Rust, Docker, Terraform, MCP & more. 11,500+ downloads. AGPL-3.0. | https://github.com/Pantheon-Security/medusa | POC详情 |
| 159 | CVE-2025-55182 (React2Shell) Scanner | https://github.com/rapticore/ore_react2shell_scanner | POC详情 |
| 160 | CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner) | https://github.com/l0n3m4n/CVE-2025-55182-Clean | POC详情 |
| 161 | Automated scanner for CVE-2025-55182: a critical RCE vulnerability in React Server Components and Next.js. | https://github.com/Qixinlee/CVE-2025-55182-Scanner | POC详情 |
| 162 | Security toolkit to detect CVE-2025-55182 (React2Shell) vulnerability | https://github.com/DelvyGonzalez/react2shell-security-toolkit | POC详情 |
| 163 | None | https://github.com/jumodada/react-cve-2025-55182-demo | POC详情 |
| 164 | None | https://github.com/ahmedshamsddin/CVE-2025-55182 | POC详情 |
| 165 | This is CVE-2025-55182 exploit | https://github.com/LemonTeatw1/CVE-2025-55182-exploit | POC详情 |
| 166 | None | https://github.com/mil4ne/CVE-2025-55182-React2Shell- | POC详情 |
| 167 | None | https://github.com/ethicalrohitt/React2Shell_cve-2025-55182 | POC详情 |
| 168 | This is an easy to use PoC script to exploit React2Shell-CVE-2025-55182 Nextjs vulnerability. This will help to gain a reverse shell. | https://github.com/ihhgimhana/React2Shell-CVE-2025-55182-PoC-Reverse-Shell | POC详情 |
| 169 | CVE-2025-55182 Detector. Find which of your GitHub repositories are exposed to the critical React/Next.js RCE vulnerability and generate a clean Markdown report. | https://github.com/shakilkhatri/scanner-for-CVE-2025-55182-vulnerability | POC详情 |
| 170 | react2shell PoC with Go / CVE-2025-55182 | https://github.com/UmmItKin/CVE-2025-55182-PoC | POC详情 |
| 171 | None | https://github.com/robbin0919/CVE-2025-55182 | POC详情 |
| 172 | CVE-2025-55182-POC | https://github.com/zxz3650/CVE-2025-55182-POC | POC详情 |
| 173 | Critical RCE vulnerability scanner for React Server Components (CVE-2025-55182). Automated exploitation framework with multi-payload support, proxy capabilities, and interactive command execution. | https://github.com/AliHzSec/CVE-2025-55182 | POC详情 |
| 174 | A complete framework for exploiting the vulnerability CVE-2025-55182 | https://github.com/zr0n/react2shell | POC详情 |
| 175 | None | https://github.com/hunter24x24/CVE-2025-55182-mass | POC详情 |
| 176 | None | https://github.com/andressuarezmonk/CVE-2025-55182 | POC详情 |
| 177 | 🔥 React2Shell Toolkit - CVE-2025-55182 & CVE-2025-66478 | https://github.com/cybertechajju/R2C-CVE-2025-55182-66478 | POC详情 |
| 178 | None | https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool | POC详情 |
| 179 | CVE-2025-55182 – React2Shell: Proof-of-Concept Remote Code Execution (RCE) exploit for Next.js apps. Features an interactive shell prompt to test and demonstrate the vulnerability in real time. Use for security research and authorized penetration-testing only. | https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell | POC详情 |
| 180 | A standalone GUI tool to detect and demonstrate the **React Server Components Remote Code Execution (RCE)** vulnerability (CVE-2025-55182) in Next.js applications. | https://github.com/SainiONHacks/CVE-2025-55182-Scanner | POC详情 |
| 181 | A bash script to scan your server for React applications vulnerable to **CVE-2025-55182** — a critical remote code execution vulnerability (CVSS 10.0) in React Server Components. | https://github.com/umairahmadh/react-vuln-scanner | POC详情 |
| 182 | Torito React2Shell Scanner & Exploit Tool (CVE-2025-55182 / 66478) | https://github.com/ToritoIO/Torito-R2S | POC详情 |
| 183 | react2shell CVE-2025-55182 PoC | https://github.com/surajhacx/react2shellpoc | POC详情 |
| 184 | Step-by-step walkthrough of CVE-2025-55182 (React2Shell) by tracing React's Flight protocol internals. | https://github.com/kavienanj/CVE-2025-55182 | POC详情 |
| 185 | A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution (RCE) vulnerability in React Server Components known as "React2Shell". | https://github.com/websecuritylabs/React2Shell-Library | POC详情 |
| 186 | None | https://github.com/cyberleelawat/CVE-2025-55182 | POC详情 |
| 187 | High-fidelity RCE scanner for CVE-2025-55182 affecting Next.js RSC. Supports mass scanning, command execution, and automated recon pipelines. Built for pentesters, researchers, and bounty hunters. | https://github.com/satriarizka/CVE-2025-55182-Simple-Scanner | POC详情 |
| 188 | [漏洞复现] 全球首款基于RSC特性能绕过WAF检测的CVE-2025-55182 React Server RCE 漏洞 EXP。 | https://github.com/xcanwin/CVE-2025-55182-React-RCE | POC详情 |
| 189 | Play with react2shell in a safe environment! | https://github.com/CharlesTheGreat77/CVE-2025-55182-Test-Server | POC详情 |
| 190 | * React2Shell-CVE-2025-55182 | https://github.com/ihsansencan/React2Shell-CVE-2025-55182 | POC详情 |
| 191 | Header bypass for CVE-2025-55182 (React Server Components RCE). | https://github.com/ejpir/CVE-2025-55182-bypass | POC详情 |
| 192 | My research on CVE-2025-55182 | https://github.com/I3r1h0n/React2Shell | POC详情 |
| 193 | CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (exploit and scanner) | https://github.com/l0n3m4n/CVE-2025-55182-Waf | POC详情 |
| 194 | 🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE-2025-66478, malware, and supply chain attacks. Elementary security for complex codebases! | https://github.com/hlsitechio/shellockolm | POC详情 |
| 195 | POC and lab setup | https://github.com/timsonner/React2Shell-CVE-2025-55182 | POC详情 |
| 196 | A security scanner for detecting CVE-2025-55182 React Server Components vulnerability | https://github.com/xiaoxiunique/CVE-2025-55182-scanner | POC详情 |
| 197 | None | https://github.com/lalaterry/CVE-2025-55182-React2Shell-lab | POC详情 |
| 198 | scanner testing | https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478 | POC详情 |
| 199 | None | https://github.com/faizdotid/rust-cve-2025-55182 | POC详情 |
| 200 | CVE-2025-55182 + CVE-2025-66478 - Next.js/React Server Components Remote Code Execution | https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478 | POC详情 |
| 201 | React2Shell Vulnerability | https://github.com/LucasPDiniz/CVE-2025-55182 | POC详情 |
| 202 | https://gist.github.com/maple3142/48bc9393f45e068cf8c90ab865c0f5f3 | https://github.com/wangzhengquan/CVE-2025-55182 | POC详情 |
| 203 | None | https://github.com/lee191/CVE-2025-55182 | POC详情 |
| 204 | CVE-2025-55182 PoC | https://github.com/Night-have-dreams/CVE-2025-55182-PoC | POC详情 |
| 205 | ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready | https://github.com/C00LN3T/React2Shell | POC详情 |
| 206 | None | https://github.com/thekamran/CVE-2025-55182-Proof-of-Concept | POC详情 |
| 207 | A modern, user-friendly GUI application for detecting and exploiting the CVE-2025-55182 vulnerability in React Server Components. Built with Python and Tkinter, featuring a sleek neon-themed interface for scanning targets, executing shell commands, and viewing live console output. | https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE | POC详情 |
| 208 | None | https://github.com/0xsj/CVE-2025-55182 | POC详情 |
| 209 | a dart package to analyze CVE-2025-55182 react2shell | https://github.com/Benrich127N/react2shell_analyzer | POC详情 |
| 210 | CVE-2025-55182 | https://github.com/7amzahard/React2shell | POC详情 |
| 211 | CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다. | https://github.com/randarts/react-rce | POC详情 |
| 212 | A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable to CVE-2025-55182 (React2Shell) in local projects. | https://github.com/hamm0nz/react2shell-audit | POC详情 |
| 213 | None | https://github.com/0xSalm0n/CVE-2025-55182 | POC详情 |
| 214 | None | https://github.com/Macaroniwdcheese/CVE-2025-55182-Lab | POC详情 |
| 215 | Exploit for CVE-2025-55182 (React4Shell) | https://github.com/LvMalware/CVE-2025-55182 | POC详情 |
| 216 | None | https://github.com/HUAHUAI23/CVE-2025-55182-POC | POC详情 |
| 217 | Alat ini mendeteksi potensi kerentanan React2Shell (CVE-2025-55182) dalam proyek React dengan memeriksa: - File `package.json` dan file lock untuk paket rentan - Direktori `node_modules` untuk dependensi yang terpengaruh - URL secara pasif untuk deteksi jarak jauh | https://github.com/cahyod/react2shell | POC详情 |
| 218 | CVE-2025-55182-scanner with 2 different method | https://github.com/yaupunal/CVE-2025-55182-scanner | POC详情 |
| 219 | None | https://github.com/jandelima/cve-2025-55182-poc-test | POC详情 |
| 220 | 🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities. | https://github.com/im-ezboy/CVE-2025-55182-zoomeye | POC详情 |
| 221 | CVE-2025-55182 Burp Passive Extension | https://github.com/Ibonok/CVE-2025-55182-Burp-Passive-Extension | POC详情 |
| 222 | CVE-2025-55182 React2Shell PoC | https://github.com/lowercasenumbers/CVE-2025-55182 | POC详情 |
| 223 | [React2Hell] Next.js/React Server RCE Exploit — CVE-2025-55182 | https://github.com/AggressiveUser/React2Hell | POC详情 |
| 224 | CVE-2025-55182 Next.js RCE Exploit Tool | https://github.com/racall/cve-2025-55182-node | POC详情 |
| 225 | CVE-2025-55182 and CVE-2025-66478 | https://github.com/FurkanKAYAPINAR/ReactNext2Shell | POC详情 |
| 226 | rsc-detect-cve-2025-55182 is a static analysis tool designed to detect potential indicators of CVE-2025-55182 | https://github.com/horsenyet/RSC-Detect-CVE-2025-55182 | POC详情 |
| 227 | None | https://github.com/LQTjim/next-bug-CVE-2025-55182 | POC详情 |
| 228 | Heuristic security scanner for detecting React Server Components (RSC) vulnerabilities, including React2Shell-style behavior (CVE-2025-55182). Safe, non-exploitative, multi-target capable. | https://github.com/AliAbdollahiii/react2shell_detector | POC详情 |
| 229 | A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications | https://github.com/xiaopeng-ye/react2shell-detector | POC详情 |
| 230 | VulnCheck CVE-2025-55182 react2shell | https://github.com/vulncheck-oss/cve-2025-55182 | POC详情 |
| 231 | Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services. | https://github.com/Shield-Cyber/react2shell-scanner | POC详情 |
| 232 | None | https://github.com/imbas007/POC-CVE-2025-55182 | POC详情 |
| 233 | * React2Shell-CVE-2025-55182 | https://github.com/chitoz1300/React2Shell-CVE-2025-55182 | POC详情 |
| 234 | Thực hiện để test CVE 2025 55182 | https://github.com/foodmen2111/test-cve-2025-55182 | POC详情 |
| 235 | CVE-2025-55182 检测方式和攻击利用 | https://github.com/sun977/CVE-2025-55182 | POC详情 |
| 236 | PoC-react2shell-CVE-2025-55182 | https://github.com/garux-sec/PoC-react2shell-CVE-2025-55182 | POC详情 |
| 237 | Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust) | https://github.com/ancs21/react2shell-scanner-rust | POC详情 |
| 238 | Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478 | https://github.com/MoisesTapia/http-react2shell | POC详情 |
| 239 | None | https://github.com/hadipra5/CVE-2025-55182-Auto-Exploit-Toolkit | POC详情 |
| 240 | None | https://github.com/techgaun/cve-2025-55182-scanner | POC详情 |
| 241 | React2Shell (CVE-2025-55182) proof-of-concept (PoC) exploit demonstrating a CRITICAL remote code execution (RCE) vulnerability in modern web frameworks using React Server Components (RSC). | https://github.com/rsch-io/CVE-2025-55182-React2Shell | POC详情 |
| 242 | None | https://github.com/ilixm/PoC-RCE-CVE-2025-55182 | POC详情 |
| 243 | None | https://github.com/iamblacksolo2-BugBounty/POC-CVE-2025-55182 | POC详情 |
| 244 | a simple react2shell poc with basic waf bypass | https://github.com/joelvaiju/react2shell-CVE-2025-55182-poc | POC详情 |
| 245 | POC-CVE-2025-55182 | https://github.com/DevVaibhav07/POC-CVE-2025-55182 | POC详情 |
| 246 | Python3 script that can be used to demonstrate **CVE-2025-55182**. It exploits a server-side JavaScript injection vulnerability in Next.js/React applications, allowing **remote code execution** via malformed multipart form data. | https://github.com/liamromanis101/cve-2025-55182 | POC详情 |
| 247 | None | https://github.com/ysfcndgr/React2Shell-CVE-2025-55182-Advanced-Scanner | POC详情 |
| 248 | None | https://github.com/alfazhossain/CVE-2025-55182-Exploiter | POC详情 |
| 249 | None | https://github.com/keshavyaduvans/cve-2025-55182 | POC详情 |
| 250 | proof | https://github.com/byte16384/CVE-2025-55182 | POC详情 |
| 251 | POC for React2Shell (CVE-2025-55182) | https://github.com/kondukto-io/vulnerable-next-js-poc | POC详情 |
| 252 | Test case for CVE-2025-55182 | https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-webpack | POC详情 |
| 253 | Test case for CVE-2025-55182 | https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-parcel | POC详情 |
| 254 | Test case for CVE-2025-55182 | https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack | POC详情 |
| 255 | None | https://github.com/eytannatye/R2S_CVE-2025-55182 | POC详情 |
| 256 | PoC, Hunting React2Shell about CVE-2025-55182 | https://github.com/Jaycelation/CVE-2025-55182 | POC详情 |
| 257 | React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC). | https://github.com/shyambhanushali/React2Shell | POC详情 |
| 258 | None | https://github.com/amir-malek/react-cve-2025-55182 | POC详情 |
| 259 | CVE-2025-55182-advanced-scanner | https://github.com/Ankitspandey07/React2Shell | POC详情 |
| 260 | malware I found on my server | https://github.com/Stonelinks/react-cve-2025-55182 | POC详情 |
| 261 | A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks that use it like Next.js (CVE-2025-66478). | https://github.com/dr4xp/react2shell | POC详情 |
| 262 | Proof of Concept for CVE-2025-55182 ("React2Shell"). A fully dockerized environment demonstrating Remote Code Execution (RCE) via insecure deserialization in React Server Components. Includes vulnerable targets for both Vanilla React (Express) and Next.js, along with a custom Python exploit script. | https://github.com/trax69/cve-2025-55182-poc | POC详情 |
| 263 | Demo of CVE-2025-55182 — Next.js RCE (for educational purposes) | https://github.com/osman-butt/CVE-2025-55182-demo | POC详情 |
| 264 | None | https://github.com/mil4ne/CVE-2025-55182-React2Shell | POC详情 |
| 265 | py script proof of concept new CVE-2025-55182 based in lachlan2k script | https://github.com/notkittenn/poc_react2shell | POC详情 |
| 266 | ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell) | https://github.com/theori-io/reactguard | POC详情 |
| 267 | None | https://github.com/iamblacksolo2-BugBounty/POC2-CVE-2025-55182 | POC详情 |
| 268 | None | https://github.com/BakhodiribnYashinibnMansur/CVE-2025-55182 | POC详情 |
| 269 | CVE-2025-55182 React RCE Test Server | https://github.com/theman001/CVE-2025-55182_PoC-Test-Server | POC详情 |
| 270 | Next.js RCE via React Server Functions | https://github.com/gunyakit/CVE-2025-55182-PoC-exploit | POC详情 |
| 271 | A command-line tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using React Server Components. | https://github.com/rix4uni/CVE-2025-55182 | POC详情 |
| 272 | A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182] | https://github.com/gonaumov/cve-2025-55182-checker | POC详情 |
| 273 | None | https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell | POC详情 |
| 274 | None | https://github.com/Legus-Yeung/CVE-2025-55182-exploit | POC详情 |
| 275 | None | https://github.com/DanielXavierJob/-CVE-2025-55182 | POC详情 |
| 276 | Reproduction for Next.js CVE-2025-55182 version string confusion issue | https://github.com/sponte/nextjs-cve-version-confusion | POC详情 |
| 277 | None | https://github.com/CrazyloveforWeb/Golang-CVE-2025-55182-POC | POC详情 |
| 278 | Nmap NSE script for scanning React2Shell (CVE-2025-55182) | https://github.com/JahazielLem/NSE_CVE-2025-55182 | POC详情 |
| 279 | Elite exploitation toolkit for CVE-2025-55182 (React Server Components RCE). Async polymorphic payloads, advanced WAF/CDN bypass, proxy rotation, Shodan/Censys mass scan, auto-pwn + reverse shells, Nuclei templates, K8s lab & C2 dashboard. Authored by Sudeepa Wanigarathna – strictly for authorized red team and penetration testing. | https://github.com/CerberusMrX/Cerberus-React2Shell-Scanner-Exploit | POC详情 |
| 280 | nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability | https://github.com/Saad-Ayady/react2shellNSE | POC详情 |
| 281 | RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-language support. Built with Electron & React. | https://github.com/VeilVulp/RscScan | POC详情 |
| 282 | A CTF challenge based on CVE-2025-55182 Vulnerability | https://github.com/yz9yt/React2Shell-CTF | POC详情 |
| 283 | None | https://github.com/Gymnott1/CVE-2025-55182 | POC详情 |
| 284 | A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE. | https://github.com/J4ck3LSyN-Gen2/CVE-2025-55182 | POC详情 |
| 285 | Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components | https://github.com/pkrasulia/CVE-2025-55182-NextJS-RCE-PoC | POC详情 |
| 286 | Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server Actions | https://github.com/oscarmine/R2SAE | POC详情 |
| 287 | Next.js-Exploit-Tool 图形化综合利用工具,基于 Go 开发,一款针对 CVE-2025-55182 的独立安全评估工具。 | https://github.com/Rsatan/Next.js-Exploit-Tool | POC详情 |
| 288 | None | https://github.com/min8282/CVE-2025-55182 | POC详情 |
| 289 | Intentionally vulnerable Next.js app for CVE-2025-55182 security research and CTF challenges | https://github.com/Machine-farmer/PunchingBag-for-React2Shell | POC详情 |
| 290 | None | https://github.com/exrienz/CVE-2025-55182-NextJS-Scanner-React2Shell-PoC | POC详情 |
| 291 | Educational / research tool related to React / Next.js vulnerability CVE‑2025‑55182 (“React2Shell”). | https://github.com/mrmtwoj/React2Shell-CVE-2025-55182 | POC详情 |
| 292 | None | https://github.com/xalgord1/CVE-2025-55182-POC | POC详情 |
| 293 | None | https://github.com/LC-pro/CVE-2025-55182-EXP | POC详情 |
| 294 | This tool is a Proof of Concept (PoC) intended for security research and educational purposes only. Using this tool on systems without explicit permission is illegal and punishable by law. The author (Tiger-Foxx) assumes no responsibility for misuse. | https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182 | POC详情 |
| 295 | React2Shell (CVE-2025-55182) scanner | https://github.com/trilogy-group/react2shell-scan | POC详情 |
| 296 | Interactive visualization explaining React Server Components, Flight Protocol, and the React2Shell (CVE-2025-55182) RCE vulnerability. Features narrated animations synced with ElevenLabs + Whisper. | https://github.com/VolksRat71/react2shellexploitvisualized | POC详情 |
| 297 | A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications | https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension | POC详情 |
| 298 | CVE-2025-55182 | https://github.com/andrei2308/react2shell | POC详情 |
| 299 | None | https://github.com/Nkwenti-Severian-Ndongtsop/POC_react2shell_CVE-2025-55182 | POC详情 |
| 300 | R2S is a comprehensive exploitation and post-exploitation framework targeting the Next.js React Server Components vulnerability (CVE-2025-55182). It provides an interactive shell with advanced features for penetration testing, including file transfer, persistence, enumeration, privilege escalation checks, and more. | https://github.com/4nuxd/React2Shell | POC详情 |
| 301 | Burp Suite extension for identifying the React Server Components unsafe deserialization vulnerability (React2Shell / CVE-2025-55182). It provides a focused UI tab, context-menu actions, active-scanner integration, and optional Burp Collaborator confirmation. | https://github.com/j0lt-github/react2shell-burp | POC详情 |
| 302 | RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-language support. Built with Electron & React. | https://github.com/VeilVulp/RscScan-cve-2025-55182 | POC详情 |
| 303 | CVE-2025-55182 payload | https://github.com/IrsyadSEC/CVE-2025-55182-MassPayloadAttack | POC详情 |
| 304 | POC React2Shell-CVE-2025-55182 | https://github.com/Shadowroot97/React2Shell-CVE-2025-55182 | POC详情 |
| 305 | None | https://github.com/yuta3003/CVE-2025-55182 | POC详情 |
| 306 | None | https://github.com/securifyai/React2Shell-CVE-2025-55182 | POC详情 |
| 307 | None | https://github.com/W41T3D3V1L/COMPLETE-CVE-2025-55182 | POC详情 |
| 308 | CVE-2025-55182 React2Shell in rust | https://github.com/0x5k/rs_CVE-2025-55182_React2Shell | POC详情 |
| 309 | simple Proof-of-Concept (PoC) exploit for CVE-2025-55182 | https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO- | POC详情 |
| 310 | CVE-2025-55182 の検証用 | https://github.com/oguri-souhei/CVE-2025-55182 | POC详情 |
| 311 | Advanced Exploitation Toolkit for Next.js Server Actions (CVE-2025-55182) | https://github.com/xalgord/React2Shell | POC详情 |
| 312 | POC React2Shell - CVE-2025-55182 - CVE-2025-55184 | https://github.com/caohungphu/react2shell | POC详情 |
| 313 | None | https://github.com/ryanhafid/PoC_CVE-2025-55182 | POC详情 |
| 314 | None | https://github.com/ryanhafid/Scan_CVE-2025-55182 | POC详情 |
| 315 | CVE-2025-55182 - React2Shell Educational Tool | https://github.com/0xLutfifakee/CVE-2025-55182-React2Shell | POC详情 |
| 316 | CVE-2025-55182 – CVE-2025-66478 – React2Shell | https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182 | POC详情 |
| 317 | AI agent-ready prompt to scan Node.js/React/Next.js projects for Shai-Hulud 2.0 (npm worm) and React2Shell (CVE-2025-55182 RCE). Guides AI agents (Claude, Gemini, Grok, etc.) to check dependencies, versions, GitHub repos, detect compromise, and provide step-by-step remediation. | https://github.com/eaizy/react2hulud-scan | POC详情 |
| 318 | Security testing toolkit for CVE-2025-55182 - React Server Components RCE via prototype pollution. Includes CLI scanner, Chrome extension, Nuclei templates, and Docker lab with CTF flags. | https://github.com/sho-luv/React2Shell | POC详情 |
| 319 | High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478). | https://github.com/h0tak88r/next88 | POC详情 |
| 320 | Hack The Box Writeup for Retired Challenge ReactOOPS - Complete solution and educational guide to CVE-2025-55182/CVE-2025-66478 (React2Shell RCE). Includes detailed vulnerability analysis, exploitation techniques, and team learning materials. | https://github.com/TheStingR/ReactOOPS-WriteUp | POC详情 |
| 321 | A CLI tool that exploits vulnerabilities in React Server Components and Server Actions (CVE-2025-55182, CVE-2025-66478) to achieve remote code execution (RCE) on vulnerable servers. | https://github.com/mantvmass/react2shell | POC详情 |
| 322 | A CVE-2025-55182(React2Shell) Toolbox Application | https://github.com/MoLeft/React2Shell-Toolbox | POC详情 |
| 323 | Analysis, Validation Environment, and POC for CVE-225-55182 Vulnerability. | https://github.com/Ya0h4cker/CVE-2025-55182 | POC详情 |
| 324 | A research report on CVE-2025-55182 (React2Shell). | https://github.com/Kugelbyte/React2Shell-Analysis | POC详情 |
| 325 | A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote Code Execution in React Server Components | https://github.com/dhananjayakumarn/CVE-2025-55182-Lab | POC详情 |
| 326 | None | https://github.com/ZorvithonLeo-Null/CVE-2025-55182-exploit | POC详情 |
| 327 | NodeJS-based exploit script and scanner for the React Server Components "React2Shell" vulnerability (CVE-2025-55182). | https://github.com/sangleshubham/React-Security-CVE-2025-55182-Exploit | POC详情 |
| 328 | A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications. Features combined static code analysis and safe dynamic verification for DevSecOps workflows. | https://github.com/TrixSec/CVE-2025-55182-Scanner | POC详情 |
| 329 | Check if your server is affected by CVE-2025-55182 & CVE-2025-66478 | https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478 | POC详情 |
| 330 | None | https://github.com/grejh0t/CVE-2025-55182 | POC详情 |
| 331 | A modern Next.js vulnerable web app themed as a news / blog portal for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3. | https://github.com/hidden-investigations/react2shell-vulnlab | POC详情 |
标题: CVE-2025-55182 -- 🔗来源链接
标签:x_refsource_CONFIRM
神龙速读:
- **CVE编号**: CVE-2025-55182
- **漏洞描述**: 在React Server Components版本19.0.0, 19.1.0, 19.1.1, react-server-dom-parcel, react-server-dom-turbopack, 和 react-server-dom-webpack中存在一个预验证的远程代码执行漏洞。漏洞代码不安全地反序列化payloads,可能导致任意JS代码执行。
- **影响版本**:
- **react-server-dom-webpack (Meta)**
- 默认状态: 未受影响
- 影响版本: 19.0.0 到 19.2.0
- **react-server-dom-turbopack (Meta)**
- 默认状态: 未受影响
- 影响版本: 19.0.0 到 19.2.0
- **react-server-dom-parcel (Meta)**
- 默认状态: 未受影响
- 影响版本: 19.0.0 到 19.2.0
- **参考资料**: <https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components>
标题: Critical Security Vulnerability in React Server Components – React -- 🔗来源链接
标签:x_refsource_CONFIRM
神龙速读:
### 关键漏洞信息
- **漏洞描述**: React Server Components 中存在一个未授权远程代码执行漏洞,允许攻击者在 React Server Function 端点中利用 React 解码发送的负载中的漏洞执行远程代码。
- **CVE 编号**: CVE-2025-55182
- **CVSS 评分**: 10.0
- **影响版本**:
- `react-server-dom-webpack`: 19.0, 19.1.0, 19.1.1, 19.2.0
- `react-server-dom-parcel`: 19.0, 19.1.0, 19.1.1, 19.2.0
- `react-server-dom-turbopack`: 19.0, 19.1.0, 19.1.1, 19.2.0
- **受影响的框架和打包工具**: Next.js, React Router, Waku, @parcel/rsc, @vitejs/plugin-rsc, rwsk
- **修复版本**:
- `react-server-dom-webpack`, `react-server-dom-parcel`, `react-server-dom-turbopack` 版本 19.0.1, 19.1.2, 19.2.1
- **时间线**:
- 2025 年 11 月 29 日: 描述漏洞
- 2025 年 11 月 30 日: 确认并修复
- 2025 年 12 月 1 日: 发布修复
- 2025 年 12 月 3 日: 公开披露漏洞
- **补救措施**: 立即升级到修复版本或联系受影响的框架/工具的官方文档获取更多详细更新指导。
暂无评论