React Server Components (RSC)
The core vulnerability resides in the React server libraries that implement
the Flight protocol:
react-server-dom-webpack
react-server-dom-parcel
react-server-dom-turbopack
Explicitly vulnerable versions
- 19.0.0
- 19.1.0
- 19.1.1
- 19.2.0
Patched versions
- ≥ 19.0.1
- ≥ 19.1.2
- ≥ 19.2.1
Other React 19.x versions not explicitly listed as vulnerable or patched
should be checked against the current advisory.
Classic client-only React apps without an RSC server are not affected by
React2Shell itself, although they may be vulnerable through other issues.
Next.js (CVE-2025-66478)
Next.js integrates RSC functionality and exposes it via the
App Router and server actions. For many organisations,
this is the most relevant attack surface.
Vulnerable releases (selection)
- 14.3.0-canary.77+ (certain canaries)
- 15.x before fixed releases
- 16.x before fixed releases
Patched releases (selection)
- 15.0.5
- 15.1.9
- 15.2.6
- 15.3.6
- 15.4.8
- 15.5.7
- 16.0.7
- 15.6.0-canary.58
- 16.1.0-canary.12
Even with patched Next.js versions, you should verify that lockfiles and
transitive dependencies no longer reference vulnerable RSC packages.
Other affected frameworks & ecosystems
Beyond Next.js, any framework that uses React Server Components or the Flight
protocol may be affected, including:
React Router (RSC mode)
Waku
@parcel/rsc
@vitejs/plugin-rsc
RedwoodSDK
Expo with RSC support
In many SBOMs/SCA reports, these components only appear indirectly via React.
A deeper dependency-tree analysis is therefore recommended.