PT-2025-48971 · Vercel+1 · Next.Js+1
Published
2025-12-03
·
Updated
2026-03-01
·
CVE-2025-66478
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Next.js versions 14.3.0-canary.77 through 16.0.6
React versions 19.0.0 and later
Description
A critical Remote Code Execution (RCE) vulnerability (CVE-2025-66478) exists in Next.js applications utilizing the App Router and React Server Components (RSC). This vulnerability allows attackers to execute arbitrary code on the server through crafted HTTP requests. The vulnerability stems from insecure deserialization within the RSC protocol. Exploitation has been observed in the wild, with attackers deploying cryptominers and attempting to steal sensitive data. The vulnerability affects Next.js versions 14.3.0-canary.77 and later, as well as React versions 19.0.0 and later. Several reports indicate active exploitation, with attackers leveraging the vulnerability to install malicious software and compromise systems. The vulnerability is rated with a CVSS score of 10.0, indicating its critical severity.
Recommendations
Upgrade Next.js to version 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, or 16.0.7.
Consider using the
npx fix-react2shell-next tool to automatically patch affected Next.js applications.
If using older versions, downgrade to a stable 14.x version.
Rotate all sensitive credentials, including database passwords, API keys, and environment variables.
Review and lock down internal network ports and access rules.
Enable a Web Application Firewall (WAF) for added protection.
Ensure Docker containers are not running as root.
Monitor systems for suspicious activity and potential compromise.Exploit
Fix
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2025-15156
CVE-2025-66478
Affected Products
Next.Js
React
References · 445
- 🔥 https://github.com/ejpir/CVE-2025-55182-poc⭐ 785 🔗 208 · Exploit
- 🔥 https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478⭐ 271 🔗 58 · Exploit
- 🔥 https://github.com/fatguru/CVE-2025-55182-scanner⭐ 75 🔗 14 · Exploit
- 🔥 https://github.com/Ashwesker/Blackash-CVE-2025-55182⭐ 55 🔗 26 · Exploit
- 🔥 https://github.com/sickwell/CVE-2025-55182⭐ 7 🔗 3 · Exploit
- https://bdu.fstec.ru/vul/2025-15156 · Security Note
- https://github.com/vercel-labs/fix-react2shell-next⭐ 280 🔗 40 · Note
- https://github.com/hackersatyamrastogi/react2shell-ultimate⭐ 15 🔗 4 · Note
- https://twitter.com/shehackspurple/status/1997420899067130026 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1997396961016897680 · Twitter Post
- https://twitter.com/ReliaQuestTR/status/1996966390826254514 · Twitter Post
- https://twitter.com/tech_maddy/status/1996491371356852341 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1pizukl/top_10_trending_cves_10122025 · Reddit Post
- https://twitter.com/citiyrank/status/1997261621887156402 · Twitter Post
- https://twitter.com/grok/status/2000044469849038949 · Twitter Post