Speak to an expert

01684 252 770

React2Shell: Understanding the New React Security Threat and How to Respond

8th Dec 2025

A new security vulnerability – React2Shell (CVE-2025-55182) – has recently come to light. It affects certain configurations of React, one of the most widely used technologies in modern web development. While headline vulnerabilities can often feel distant or overly technical, this one deserves attention because it targets the server-side of applications, where the most sensitive operations occur.

Put simply, React2Shell could, in specific circumstances, allow an attacker to run commands directly on the server powering your systems. That can lead to data theft, system compromise and further movement across your network. For organisations handling personal, operational or financial data, this is a scenario that needs rapid assessment.

Why this vulnerability matters

React is frequently used solely in the browser to deliver interactive user experiences. In those cases, React2Shell does not apply. However, as organisations increasingly adopt server-side rendering or newer features such as React Server Components, React is playing a more central role in infrastructure.

That shift has benefits – smoother performance, better SEO, enhanced user experience – but it also introduces new risk surfaces. React2Shell is one of those, emerging from the complexity of server behaviour.

Who may be affected?

The vulnerability relates to specific React Server Component packages, including:

  • react-server-dom-webpack
  • react-server-dom-parcel
  • react-server-dom-turbopack

These packages are sometimes used directly, but are also frequently included inside authentication systems, design frameworks or build tools. This means you may not immediately realise you are using them.

In addition, several popular frameworks incorporate these components as part of their server-side capabilities:

  • Newer versions of Next.js
  • React Router when server components are enabled
  • Waku and other modern build/runtime tools

If any part of your application uses React on the server – even just for login pages or specific content sections – you may be exposed without knowing it.

The challenge many teams face

Today’s technology stacks are layered, modular and often inherited from previous development decisions. It is common for organisations to be uncertain whether server-side React features have been enabled:

  • Have third-party components pulled these packages into the build?
  • Has a developer switched on server streaming to improve performance?
  • Is an older, proof-of-concept feature still deployed in production?

React2Shell is not a theoretical flaw – real-world exploit code exists. The sooner you know your status, the sooner you can make informed decisions.

Our free exposure scan

Assure Technical is helping organisations gain clarity quickly. We are offering a free, expert-led scan that identifies whether your environment uses the affected components.

This service is:

  • Fast – typically completed within minutes
  • Non-intrusive – no downtime, no disruption
  • Action-focused – clear results and tailored guidance

You will receive:

  • Assurance if no risk is identified
  • Direct recommendations if exposure is detected
  • Support options for remediation if required

There is no obligation beyond confirming your current position.

What happens after the scan?

If your systems are unaffected, you have instant peace of mind.

If any exposure is found, we will help you understand:

  • Which components are involved
  • Why the risk exists
  • What specific steps will remove the threat
  • How to avoid similar issues in future deployments

Our objective is to ensure you remain safe while enabling your teams to continue innovating with modern technologies.

Security threats will continue to evolve as the web ecosystem advances. React2Shell is a reminder that when capabilities shift from the browser into the server environment, the stakes rise as well. With the right expertise, these risks can be addressed swiftly and confidently.

If you would like to find out more, please get in touch. Our award-winning team are here to help you become more cyber secure.

Keeping security
simple

Get in touch with our expert consultants for straight-talking, jargon-free technical security advice.

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.