React2Shell Scanner | Blacklock
React2Shell Scanner | Blacklock
Explore Blacklock in action

CVE-2025-55182

React2Shell Scanner

CVE-2025-55182 (React2Shell) is a critical vulnerability that can allow unauthenticated remote code execution in applications using vulnerable React Server Components (RSC) implementations in React and/or Next.js. If exploited, attackers may gain full control of affected servers.

Blacklock.io React2Shell Scanner helps you quickly determine whether your web application is exposed. Simply enter your target URL and email address. The scanner safely tests for known React2Shell exploitation patterns and sends a clear result report to your inbox. No authentication, no intrusive exploitation — just fast, actionable insight so you can patch before attackers do.

To read more about React2Shell vulnerability, see our blog post:
https://azure-staging.blacklock.co.nz/post/cve-2025-55182-react-rsc-rce-vulnerability-guide

Find answers to common queries

Frequently Asked Questions (FAQs)

What does Blacklock.io React2Shell scanner check for? FAQ-Plus-Icon

This scanner checks whether your application is vulnerable to CVE-2025-55182 (React2Shell) by testing how your server handles React Server Component (RSC) requests. It looks for unsafe deserialization behaviour associated with vulnerable react-server-dom-* packages. The scan is non-destructive and focuses on detection, not exploitation.

How does the scanner detect the vulnerability? FAQ-Plus-Icon

Blaclock.io custom scanner sends carefully crafted RSC requests (multipart POST request) with RCE proof-of-concept payload to your application. It analyses server responses and behaviour to determine whether the backend processes malicious payloads in a way that indicates vulnerability, without executing harmful commands or modifying server state.

Is my data and target information kept private? FAQ-Plus-Icon

Yes. We only collect the target URL and email address to perform the scan and deliver results. Scan data and submitted email address is not shared, sold, or used for marketing. Information is retained only for operational and security purposes and handled in accordance with industry-standard data protection practices.

Will this scan impact my production application? FAQ-Plus-Icon

No. The scanner is designed to be safe and low-impact. It does not exploit the vulnerability, execute system commands, or modify application data. Requests closely resemble legitimate RSC traffic and should not affect availability or performance of production systems. No vulnerability exploitation is performed.

What should I do if my application is vulnerable? FAQ-Plus-Icon

If a vulnerability is detected, immediately upgrade affected React and framework dependencies to patched versions. Review server logs for suspicious activity, apply temporary WAF rules if needed, and validate that no compromise has occurred. Consider a full security assessment to ensure no further exposure exists.

Can blacklock.io help with a deeper security assessment? FAQ-Plus-Icon

Yes. If your application is vulnerable or you want further assurance, we can assist with remediation guidance, patch validation, and in-depth penetration testing. Our team can also perform broader assessments covering web applications, APIs, and infrastructure to ensure the vulnerability is fully addressed and no additional risks remain

Do you still have a question?