CVE-2025-55182, CVE-2025-6647 quick analysis
Overview
A dangerous vulnerability was disclosed in the first week of December, 2025. Servers using a vulnerable React Server Component could allow an attacker to remotely execute commands without authentication. This could allow an attacker to execute arbitrary commands on the server.
Vulnerability Principle
The vulnerability principle is described in great detail in the documentation below. The documentation requires a good understanding of JavaScript and React to read.
As I understand it, the vulnerability utilizes 3 points for the attack.
1. React Server ActionReact provides Server Actions that allow clients to execute asynchronous functions on the server end. The vulnerability leverages the Server action to execute the code passed by the client on the server end.
React Server Component functions need to handle different data formats, such as Lists. They use Flight Protocol for compatibility between these formats. The problem is that Flight Protocol is missing some validation. An attacker can exploit this vulnerability to maliciously modify the code during Flight Protocol processing, which means the attacker can execute arbitrary code of their choice.
3. javascript proto
When you tamper with code with Flight Protocol, you tamper with the javascript proto. Think of the javascript proto as a common field that objects reference. If you tamper with the proto, all objects are affected, as shown below.
By tampering with the javascript proto, the vulnerability allows the attacker to execute the desired code: _response._prefix in the request data.
References
- Analysis report: https://www.enki.co.kr/media-center/blog/complete-analysis-of-the-react2shell-cve-2025-55182-vulnerability
- PoC Code: https://github.com/msanft/CVE-2025-55182
- Datadog: https://securitylabs.datadoghq.com/articles/cve-2025-55182-react2shell-remote-code-execution-react-server-components/
- microsoft: https://techcommunity.microsoft.com/blog/azurenetworksecurityblog/protect-against-react-rsc-cve-2025-55182-with-azure-web-application-firewall-waf/4475291
- aws: https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/
- google cloud: https://cloud.google.com/blog/products/identity-security/responding-to-cve-2025-55182?hl=en
Comments
Post a Comment