No recent events yet!
Risk: | high |
Damage: |
high |
Platform(s): |
Web Applications |
Advisory ID: |
ngCERT-2025-120001 |
Version: |
nil |
CVE: |
CVE-2025-55182, CVE-2025-66478 |
Published: |
December 8, 2025 |
ngCERT alerts on critical vulnerabilities tracked as CVE-2025-55182 in React Server Components and its duplicate CVE-2025-66478 in Next.js, with a severity score of 10.0 on Nigeria cyberspace. These flaws stem from insecure deserialization in the React Server Components (RSC) "Flight" protocol that enables unauthenticated remote code execution (RCE). Particularly, the flaw dubbed "React2Shell", allows attackers to send specially crafted HTTP requests containing malicious RSC payloads to Server Actions or flight endpoints, resulting in arbitrary code execution on the server without authentication. Impacts include full server compromise, data theft, ransomware deployment, lateral movement, and persistent access. ngCERT strongly urges all organizations using affected versions of these applications to immediately install patched releases and scan for signs of exploitation.
The React Server Components "Flight" protocol serializes server-rendered component trees into a custom text-based format for streaming to the client. The vulnerability exists in the server-side deserialization logic, which unsafely evaluates object prototypes and properties from untrusted RSC payloads, allowing gadget-chain exploitation similar to classic Java deserialization attacks. An unauthenticated attacker exploits this by submitting a malicious payload to any endpoint that accepts Server Actions (e.g., POST requests with "text/x-component" content or RSC-formatted bodies), often via forms, API routes, or direct Flight requests. The server processes the payload, triggering prototype pollution or property injection that leads to arbitrary code execution in the Node.js process context. Public proof-of-concept exploits are already available, and active scanning/exploitation has been observed within hours of disclosure.
ngCERT recommends that organisations and users should:

