Skip to content

Access Control: React2Shell CVE-2025-55182 - Javascript RCE

Identifier: react2shell_2

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner

Description

React Server Components 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack contain a remote code execution caused by unsafe deserialization of payloads from HTTP requests to Server Function endpoints, letting unauthenticated attackers execute arbitrary code remotely, exploit requires no authentication. If this issue is raised, it means that we were able to execute arbitrary javascript code.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  react2shell_2:
    assets_allowed:
    - REST
    - GRAPHQL
    - WEBAPP
    skip: false

Reference

assets_allowed

Type : List[AssetType]*

List of assets that this check will cover.

skip

Type : boolean

Skip the test if true.