“We use React in the frontend – are we automatically affected?”
Not necessarily. React2Shell primarily affects React Server Components
on the server. Classic SPAs that run entirely in the browser and do not
use an RSC server are not affected by this specific vulnerability, even
though other risks may exist.
“We have already patched – are we done?”
Patching for the initial RCE (CVE-2025-55182) was an important first step,
but not the end. Additional CVEs and an incomplete DoS patch in 19.2.2 mean
that many environments need a second patch round to reach a solid baseline
(RSC 19.2.3). It is also important to review logs for potential compromise
before the patch was applied.
“Are there already active attacks?”
Yes. Security vendors report automated scanning and exploitation attempts,
including actions attributed to known APT groups and crimeware actors.
Observed payloads include tunnellers, full-featured backdoors and
cryptocurrency miners. Organisations with internet-facing Next.js/RSC
applications should prioritise log and telemetry review.
“How should we prioritise React2Shell vs. other vulnerabilities?”
Where React Server Components are exposed to the internet, React2Shell
should be treated as a top priority (P1). In environments
without RSC servers, the priority is lower but it should still be addressed
promptly as part of regular patch management and secure software supply chain
hygiene.
“Is the Next.js CVE-2025-66478 still relevant?”
No – it has been marked as a duplicate of CVE-2025-55182. In practice, this
means that the same underlying RSC bug drives both the React and Next.js
advisories. You should still track Next.js security releases, but focus your
risk assessment on the React RSC patch levels and your actual use of server
components.
“What can we tell non-technical stakeholders?”
A simple message is: “We run technology that was affected by a critical
vulnerability which is now being actively exploited worldwide. We have
applied updated vendor fixes, hardened exposed services and are reviewing
logs for signs of compromise. We also have external experts on standby
for further incident response if needed.”