React & CVEs — What happened, why it matters, and what to do now - Om Softwares

TL;DR: A critical Remote Code Execution (RCE) vulnerability tracked as CVE-2025-55182 (nicknamed React2Shell) was disclosed in early December 2025 and affects R...

TL;DR: A critical Remote Code Execution (RCE) vulnerability tracked as CVE-2025-55182 (nicknamed React2Shell) was disclosed in early December 2025 and affects React Server Components and several react-server-dom packages. It has a CVSS score of 10.0, is patchable (patches released for affected packages), and there are reports of active exploitation in the wild. If you run Server Components (RSC / Flight) in your stack, patch immediately, audit for compromise, and follow the mitigation checklist below.

What was the vulnerability?

Who/what is affected

Active exploitation & follow-on findings

Multiple security teams and incident responders reported in-the-wild exploitation shortly after disclosure; some threat actors are actively scanning and attempting RCEs against exposed Flight endpoints. In follow-ups, researchers also identified additional, lower-severity issues (DoS, potential source-code exposure) discovered while testing patches — patching remains the primary mitigation.

Immediate action — emergency checklist (apply now)

  1. Patch affected packages to the patched releases from the React team immediately (React released patched versions such as 19.0.1, 19.1.2, 19.2.1 for the server-dom packages — upgrade the specific react-server-dom-* packages in your projects). Example commands (adjust package name/version to your stack):

# example — pick the server-dom package(s) your project uses npm install [email protected] # or for yarn: yarn add [email protected] # verify installed versions npm ls react-server-dom-webpack

(Replace react-server-dom-webpack with react-server-dom-parcel or react-server-dom-turbopack as relevant.) React Reference 

  1. If you can’t patch immediately: temporarily disable or block public access to Flight / RSC endpoints (for example, restrict access via firewall/WAF or remove the route handler) until you can apply the patch. Treat any exposed Flight endpoints as high-risk.
  2. Apply WAF / network rules to block malformed Flight requests and known exploit signatures (many vendors published rules within hours of disclosure). Use your cloud provider’s managed WAF rules if available. TechRadar
  3. Audit & hunt for compromise: look for suspicious activity around the disclosure date and afterwards:
    • Unexpected process spawning, new files, or reverse shells on servers running RSC.
    • Unusual outbound connections (e.g., to IPs/domains you don’t recognize).
    • Web server logs showing abnormal HTTP requests to Flight endpoints (highly crafted POSTs, odd content lengths, serialized payloads).
    • Newly created service accounts/keys or changed credentials. Rapid7+1
  4. Contain & remediate if you detect compromise: isolate affected hosts, rotate credentials, preserve logs for forensics, rebuild from known-good images, and notify stakeholders. Consider engaging incident response if you find signs of RCE.

Longer-term hardening (lessons & best practices)

How Om Softwares Cloud Services can help you?

At Om Softwares — Cloud Services, we acknowledge how serious these React Server Component issues are. We recommend you report the problems to your RMS as soon as possible so your operations teams and risk managers can prioritize remediation. Our cloud & maintenance teams are actively:

If you already have Om Softwares maintenance services, don’t worry — our team is proactively triaging and patching customer systems and will contact you directly with findings and next steps. If you are not on maintenance and would like assistance, contact our support so we can help you patch, audit, or perform incident response. (Report to your RMS and notify Om Softwares support immediately so we can take coordinated action.)