From Recon to RCE: Hunting React2Shell (CVE-2025–55182) for Bug Bounties
文章介绍了一个严重安全漏洞CVE-2025–55182,影响基于React Server Components(RSC)和Next.js的应用程序。该漏洞源于Flight协议的数据处理机制中的反序列化问题,导致高风险攻击。文章详细说明了漏洞的工作原理、检测方法以及手动和自动化测试步骤。 2025-12-13 07:53:14 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

A step-by-step walkthrough covering discovery, validation and real-world exploitation in React and Next.js applications

coffinxp

Press enter or click to view image in full size

Introduction

CVE-2025–55182 is a critical security vulnerability affecting applications built with React Server Components (RSC), particularly those using Next.js with the App Router. Due to its high impact and low exploitation effort, it carries the maximum CVSS score of 10.0. In this guide, I will explain how this vulnerability works, show practical methods to identify affected targets and demonstrate both manual and automated approaches for testing CVE-2025–55182 safely and effectively.

How Does It Work?

The root of the issue is a flaw in how the server handles data in the “Flight” protocol, which is the communication method for React Server Components.

  1. React Server Components (RSC): This is a feature designed to speed up web applications by letting parts of the user interface (components) render on the server instead of the user’s browser.
  2. The Flaw (Insecure Deserialization): When data travels between the client (browser) and the server using the Flight protocol, the server…

文章来源: https://infosecwriteups.com/from-recon-to-rce-hunting-react2shell-cve-2025-55182-for-bug-bounties-4e3a3ed79876?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh