Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Meta | react-server-dom-webpack | 19.0.0 ~ 19.0.0 | - | |
| Meta | react-server-dom-turbopack | 19.0.0 ~ 19.0.0 | - | |
| Meta | react-server-dom-parcel | 19.0.0 ~ 19.0.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | React Server Components 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack contain a remote code execution caused by unsafe deserialization of payloads from HTTP requests to Server Function endpoints, letting unauthenticated attackers execute arbitrary code remotely, exploit requires no authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-55182.yaml | POC Details |
| 2 | Script to quick check CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Critical unauthenticated RCE vulnerabilities in the React Server Components (RSC) “Flight” protocol. | https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js | POC Details |
| 3 | CVE-2025-55182 POC | https://github.com/ejpir/CVE-2025-55182-research | POC Details |
| 4 | CVE-2025-55182 - React Server Components RCE Exploit & Scanner Supports external servers and CLI interface | https://github.com/sickwell/CVE-2025-55182 | POC Details |
| 5 | A non-intrusive surface scanner for CVE-2025-55182 (React Server Components RCE). Detects exposed RSC endpoints in React 19 and Next.js applications | https://github.com/fatguru/CVE-2025-55182-scanner | POC Details |
| 6 | CVE-2025-55182 | https://github.com/Ashwesker/Blackash-CVE-2025-55182 | POC Details |
| 7 | CVE-2025-55182 - React Server Components RCE Exploit & Scanner Supports external servers and CLI interface | https://github.com/atastycookie/CVE-2025-55182 | POC Details |
| 8 | None | https://github.com/santihabib/CVE-2025-55182-analysis | POC Details |
| 9 | None | https://github.com/xkillbit/cve-2025-55182-scanner | POC Details |
| 10 | Testing the React Server Components RCE (CVE-2025-55182) | https://github.com/rpjboyarski/java4script | POC Details |
| 11 | React2Shell Proof of Concept | https://github.com/whiteov3rflow/CVE-2025-55182-poc | POC Details |
| 12 | This POC demonstrates CVE-2025-55182 using actual `react-server-dom-webpack@19.0.0` vulnerable code. | https://github.com/Pa2sw0rd/exploit-CVE-2025-55182-poc | POC Details |
| 13 | CVE-2025-55182 | https://github.com/kk12-30/CVE-2025-55182 | POC Details |
| 14 | For CVE-2025-55182 and CVE-2025-66478 Security Response | https://github.com/heiheishushu/rsc_detect_CVE-2025-55182 | POC Details |
| 15 | CVE-2025-55182 漏洞利用GUI,PoC / Exploit for CVE-2025-55182 & CVE-2025-66478 | https://github.com/songsanggggg/CVE-2025-55182 | POC Details |
| 16 | 检测针对 CVE-2025-55182(React 服务器组件远程代码执行漏洞)的扫描器 | https://github.com/M0onPu15e/next.js-scanner | POC Details |
| 17 | a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic "Lab Environment" to safely test and understand the vulnerability. | https://github.com/ThemeHackers/CVE-2025-55182 | POC Details |
| 18 | a realistic POC demonstrating the missing `hasOwnProperty` check in react-server-dom-webpack@19.0.0 | https://github.com/joshterrill/CVE-2025-55182-realistic-poc | POC Details |
| 19 | A Comprehensive CVE-2025-55182 Detection and Security Assessment Tool | https://github.com/mingyisecurity-lab/CVE-2025-55182-TOOLS | POC Details |
| 20 | High-performance exploitation engine for CVE-2025-55182 (React Server Components RCE) | https://github.com/joaonevess/rust-flight | POC Details |
| 21 | Security scanner for CVE-2025-55182 - Critical RCE vulnerability in React Server Components. Scan npm/pnpm/yarn lockfiles, Docker images, SBOMs, and live URLs. Auto-fix, SARIF output, GitHub Actions, Vercel integration, and runtime protection middleware. | https://github.com/gensecaihq/react2shell-scanner | POC Details |
| 22 | None | https://github.com/sudo-Yangziran/CVE-2025-55182POC | POC Details |
| 23 | 一款针对 CVE-2025-55182 的独立安全评估工具,基于 Go 开发,提供图形化界面(GUI),用于快速完成漏洞检测与验证。 | https://github.com/Rsatan/CVE-2025-55182-Tools | POC Details |
| 24 | High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) | https://github.com/assetnote/react2shell-scanner | POC Details |
| 25 | RCE Auto exploit for CVE-2025-55182 | https://github.com/jf0x3a/CVE-2025-55182-exploit | POC Details |
| 26 | React/Next.js RCE CVE-2025-55182 checker | https://github.com/aspen-labs/CVE-2025-55182-checker | POC Details |
| 27 | None | https://github.com/dissy123/cve-2025-55182 | POC Details |
| 28 | Pre-auth RCE in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. | https://github.com/dwisiswant0/CVE-2025-55182 | POC Details |
| 29 | See if your endpoint could be vulnerable. | https://github.com/Chelsea486MHz/CVE-2025-55182-test | POC Details |
| 30 | None | https://github.com/oways/React2shell-CVE-2025-55182-checker | POC Details |
| 31 | Explanation and full RCE PoC for CVE-2025-55182 | https://github.com/msanft/CVE-2025-55182 | POC Details |
| 32 | CVE-2025-55182 Fix for Vibe Coders | https://github.com/ivaavimusic/React19-fix-vibecoders | POC Details |
| 33 | a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic "Lab Environment" to safely test and understand the vulnerability. | https://github.com/carlosaruy/CVE-2025-55182 | POC Details |
| 34 | Scanner for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Track and remediate a critical React Server Components (RSC) / Flight protocol vulnerability campaign impacting react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack, and RSC-enabled frameworks like Next.js. | https://github.com/Security-Phoenix-demo/freight-night-rce-react-next-CVE-2025-55182-CVE-2025-66478 | POC Details |
| 35 | some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182 | https://github.com/c0rydoras/CVE-2025-55182 | POC Details |
| 36 | React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478) | https://github.com/CymulateResearch/React2Shell-Scanner | POC Details |
| 37 | None | https://github.com/0xPThree/cve-2025-55182 | POC Details |
| 38 | Vulnerable Docker environment for reproducing CVE-2025-55182. | https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab | POC Details |
| 39 | Actual CVE-2025-55182 detection and exploit. No bullshit LLMs. | https://github.com/acheong08/CVE-2025-55182-poc | POC Details |
| 40 | Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3. | https://github.com/jctommasi/react2shellVulnApp | POC Details |
| 41 | Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478) | https://github.com/shamo0/react2shell-PoC | POC Details |
| 42 | Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages) | https://github.com/EynaExp/CVE-2025-55182-POC | POC Details |
| 43 | Unified Security Research Tool | https://github.com/im-hanzou/CVE-2025-55182-POC-SCANNER | POC Details |
| 44 | None | https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive | POC Details |
| 45 | Vulnerable REACT app in docker container and poc code - for demos | https://github.com/ps-interactive/cve-2025-55182 | POC Details |
| 46 | Burp Suite extension to detect the Next.js / React Server Components (RSC) Remote Code Execution vulnerability (CVE-2025-55182 & CVE-2025-66478). | https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension | POC Details |
| 47 | Functional Python POC to test if servers are vulnerable to CVE-2025-55182 | https://github.com/aquinn-r7/CVE-2025-55182-VulnCheckPOC | POC Details |
| 48 | PoC CVE-2025-55182 | https://github.com/MedusaSH/POC-CVE-2025-55182 | POC Details |
| 49 | None | https://github.com/marginaldeer/CVE-2025-55182_scanner | POC Details |
| 50 | Community tool to detect and remediate CVE-2025-55182 (React2Shell) - Critical RCE vulnerability in React Server Components | https://github.com/nxgn-kd01/cve-2025-55182-scanner | POC Details |
| 51 | None | https://github.com/clevernyyyy/CVE-2025-55182-Dockerized | POC Details |
| 52 | A proof of concept exploit script for CVE-2025-55182 | https://github.com/Cillian-Collins/CVE-2025-55182 | POC Details |
| 53 | Security scanner to detect CVE-2025-55182 & CVE-2025-66478 vulnerabilities in React Server Components (RSC) projects | https://github.com/ZihxS/check-react-rce-cve-2025-55182 | POC Details |
| 54 | https://github.com/vulhub/vulhub/blob/master/react/CVE-2025-55182/README.md | POC Details | |
| 55 | None | https://github.com/ducducuc111/CVE-2025-55182-poc | POC Details |
| 56 | Scanner for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Track and remediate a critical React Server Components (RSC) / Flight protocol vulnerability campaign impacting react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack, and RSC-enabled frameworks like Next.js. | https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478 | POC Details |
| 57 | Community tool to detect and remediate CVE-2025-55182 (React2Shell) - Critical RCE vulnerability in React Server Components | https://github.com/nxgn-kd01/react2shell-scanner | POC Details |
| 58 | None | https://github.com/tlfyyds/cve-2025-55182-getshell | POC Details |
| 59 | None | https://github.com/ZemarKhos/CVE-2025-55182-Exploit-PoC-Scanner | POC Details |
| 60 | None | https://github.com/sherlocksecurity/CVE-2025-55182-Exploit-scanner | POC Details |
| 61 | This is a POC script for CVE-2025-55182 (React SSR RCE) | https://github.com/Darker-Ink/react-ssr-vulnerability | POC Details |
| 62 | POC for CVE-2025-55182 | https://github.com/emadshanab/POC-for-CVE-2025-55182 | POC Details |
| 63 | None | https://github.com/topstar88/CVE-2025-55182 | POC Details |
| 64 | None | https://github.com/selectarget/CVE-2025-55182-Exploit | POC Details |
| 65 | None | https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI | POC Details |
| 66 | Exploit for CVE-2025-55182 & CVE-2025-66478 | https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool | POC Details |
| 67 | None | https://github.com/TH-SecForge/CVE-2025-55182 | POC Details |
| 68 | Next.js React Server Components RCE exploit for CVE-2025-55182 | https://github.com/Chocapikk/CVE-2025-55182 | POC Details |
| 69 | Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182. | https://github.com/mrknow001/RSC_Detector | POC Details |
| 70 | CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool | https://github.com/Spritualkb/CVE-2025-55182-exp | POC Details |
| 71 | None | https://github.com/younesZdDz/CVE-2025-55182 | POC Details |
| 72 | Original Proof-of-Concept's for React2Shell CVE-2025-55182 | https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc | POC Details |
| 73 | None | https://github.com/hualy13/CVE-2025-55182 | POC Details |
| 74 | Interactive shell (HTTP hijack + POST + AES-256-CBC/BASE64) | https://github.com/RuoJi6/CVE-2025-55182-RCE-shell | POC Details |
| 75 | A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications | https://github.com/Saturate/CVE-2025-55182-Scanner | POC Details |
| 76 | None | https://github.com/hoosin/CVE-2025-55182 | POC Details |
| 77 | 基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件 | https://github.com/Pizz33/CVE-2025-55182-burpscanner | POC Details |
| 78 | lab_demo CVE-2025-55182 | https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182 | POC Details |
| 79 | Real-world attack analysis of CVE-2025-55182 (React2Shell) - React Server Components RCE vulnerability | https://github.com/ngvcanh/CVE-2025-55182-Attack-Analysis | POC Details |
| 80 | Working proof of concept for NextJS RCE to establish a reverse shell. [React2Shell] | https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS | POC Details |
| 81 | "One crafted HTTP request can compromise your entire server." — React Security Team, Dec 2025 | https://github.com/logesh-GIT001/CVE-2025-55182 | POC Details |
| 82 | An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc | https://github.com/freeqaz/react2shell | POC Details |
| 83 | CVE-2025-55182 | https://github.com/m3m0ryc0rrupt/CVE-2025-55182-PoC | POC Details |
| 84 | A containerized testing environment for CVE-2025-55182, a critical (10.0 CVSS) Remote Code Execution vulnerability in React Server Components. | https://github.com/ABCFabian/React2Shell-CVE-2025-55182-Testing-Environment | POC Details |
| 85 | None | https://github.com/nanwinata/CVE-2025-55182-Scanner | POC Details |
| 86 | Docker poc lab for CVE-2025-55182 detection and exploitation | https://github.com/l4rm4nd/CVE-2025-55182 | POC Details |
| 87 | 浅谈React Server Components RCE 漏洞分析 | https://github.com/Airis101/CVE-2025-55182-analysis | POC Details |
| 88 | React Server Components 远程代码执行漏洞(CVE-2025-55182) | https://github.com/GelukCrab/React-Server-Components-RCE | POC Details |
| 89 | Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security | https://github.com/Golden-Secure/CVE-2025-55182 | POC Details |
| 90 | 研究CVE-2025-55182全版本利用漏洞 | https://github.com/XiaomingX/CVE-2025-55182-poc | POC Details |
| 91 | None | https://github.com/alexandre-briongos-wavestone/react-cve-2025-55182-lab | POC Details |
| 92 | This repository documents research into deserialization behavior within Next.js React Server Components (RSC) using the Flight protocol. It focuses on how malformed multipart bodies combined with Server Action request handling can lead to prototype traversal and execution primitives on certain builds. | https://github.com/Rat5ak/CVE-2025-55182-React2Shell-RCE-POC | POC Details |
| 93 | React2Shell | CVE-2025-55182 - React Server Components RCE | https://github.com/RajChowdhury240/React2Shell-CVE-2025-55182 | POC Details |
| 94 | PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) | https://github.com/nehkark/CVE-2025-55182 | POC Details |
| 95 | None | https://github.com/prestonhashworth/cve-2025-55182 | POC Details |
| 96 | POC for CVE-2025-55182 React2Shell | https://github.com/nomorebreach/POC-CVE-2025-55182 | POC Details |
| 97 | Host-based detection rules for the RCE vulnerability in the React JavaScript framework. | https://github.com/nerium-security/CVE-2025-55182 | POC Details |
| 98 | CVE-2025-55182复现环境及RCE回显poc | https://github.com/zzhorc/CVE-2025-55182 | POC Details |
| 99 | nmap nse for detecting React2Shell (CVE-2025-55182) | https://github.com/Atlantis02-sec/Vulnerability-assessment | POC Details |
| 100 | Proof-of-Concept RCE pour CVE‑2025‑55182 exploitant le protocole React Flight sur Next.js App Router. | https://github.com/rl0x01/CVE-2025-55182_PoC | POC Details |
| 101 | React2Shell (CVE-2025-55182) – An intentionally vulnerable Next.js application created for educational and research purposes. | https://github.com/subzer0x0/React2Shell | POC Details |
| 102 | Security scanner for CVE-2025-55182 - Critical RCE vulnerability in React Server Components | https://github.com/f0xyx/CVE-2025-55182-Scanner | POC Details |
| 103 | 使用burp自动检测CVE-2025-55182 Next.js RCE 漏洞 | https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension- | POC Details |
| 104 | Proof of Concept for React2Shell vulnerability | https://github.com/ceortiz33/CVE-2025-55182 | POC Details |
| 105 | PoC for React2Shell (CVE-2025-55182) | https://github.com/sh1ro8/react2shell | POC Details |
| 106 | Show case CVE-2025-55182 POC in Typrescript/Javascript | https://github.com/zessu/CVE-2025-55182-Typescript | POC Details |
| 107 | A web-based vulnerability scanner for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components. | https://github.com/mxm0z/r2s | POC Details |
| 108 | CVE-2025-55182 Interactive PoC - React Server Components RCE - Educational Security Research | https://github.com/NathanJ60/react2shell-interactive | POC Details |
| 109 | None | https://github.com/GarethMSheldon/React2Shell-CVE-2025-55182-Detector | POC Details |
| 110 | CVE-2025-55182 React2Shell PoC lab | https://github.com/alsaut1/react2shell-lab | POC Details |
| 111 | React2Shell vulnerability (CVE-2025-55182 / CVE-2025-66478) | https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script | POC Details |
| 112 | This repository contains a proof-of-concept demonstration of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. | https://github.com/kOaDT/poc-cve-2025-55182 | POC Details |
| 113 | None | https://github.com/StealthMoud/CVE-2025-55182-Scanner | POC Details |
| 114 | CVE-2025-55182 Exploit | https://github.com/yanoshercohen/CVE-2025-55182 | POC Details |
| 115 | None | https://github.com/klassiker/CVE-2025-55182 | POC Details |
| 116 | Lightweight scanner and Nuclei templates for identifying React and Next.js deserialization RCEs (CVE-2025-55182 / CVE-2025-66478). | https://github.com/grp-ops/react2shell | POC Details |
| 117 | PoC for React2Shell (CVE-2025-55182) | https://github.com/xkey8/react2shell | POC Details |
| 118 | None | https://github.com/kindone09/CVE-2025-55182 | POC Details |
| 119 | this repo have CVE-2025-55182 full exploit with RCE | https://github.com/mohit121312/CVE-2025-55182_full_exploit | POC Details |
| 120 | React2Shell (CVE-2025-55182) Exploit | https://github.com/yanoshercohen/React2Shell_CVE-2025-55182 | POC Details |
| 121 | RSC/Next.js RCE Vulnerability Detector & PoC Chrome Extension – CVE-2025-55182 & CVE-2025-66478 | https://github.com/emredavut/CVE-2025-55182 | POC Details |
| 122 | None | https://github.com/fankh/cve-2025-55182-test-lab-windows | POC Details |
| 123 | Fast scanner for detecting and confirming Next.js RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478). | https://github.com/cypholab/evilact | POC Details |
| 124 | None | https://github.com/shren207/CVE-2025-55182 | POC Details |
| 125 | Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478 | https://github.com/sumanrox/rschunter | POC Details |
| 126 | CVE-2025-55182 & CVE-2025-66478 proof of concepts | https://github.com/ayoub-intigriti/react2shell-cve | POC Details |
| 127 | None | https://github.com/zorejt/Rust_CVE-2025-55182 | POC Details |
| 128 | A critical-severity vulnerability in React Server Components (CVE-2025-55182) affects React 19 and frameworks that use it, including Next.js (CVE-2025-66478) | https://github.com/StillSoul/CVE-2025-55182 | POC Details |
| 129 | None | https://github.com/MaxK9999/CVE-2025-55182 | POC Details |
| 130 | CVE-2025-55182 poc | https://github.com/Archerkong/CVE-2025-55182 | POC Details |
| 131 | chrome extension to detect next.js sites vulnerable to CVE-2025-55182 (react2shell) | https://github.com/philparzer/nextjs-react2shell-detect | POC Details |
| 132 | None | https://github.com/Kryptopacy/Next.js-RCE-Patcher--CVE-2025-55182- | POC Details |
| 133 | Meow | https://github.com/yunaranyancat/CVE-2025-55182-NSE | POC Details |
| 134 | This is a POC for testing your projects that are vulnerable to CVE-2025-55182 with a terminal and ability to scan a list | https://github.com/MrSol0/CVE-2025-55182-Terminal | POC Details |
| 135 | A test server for demonstrating and testing React2Shell (CVE-2025-55182) vulnerability | https://github.com/fullhunt/react2shell-test-server | POC Details |
| 136 | None | https://github.com/zack0x01/vuln-app-CVE-2025-55182 | POC Details |
| 137 | None | https://github.com/zack0x01/CVE-2025-55182-advanced-scanner- | POC Details |
| 138 | AWS Organization-wide detection toolkit for CVE-2025-55182 & CVE-2025-66478 (React Server Components / Next.js RCE vulnerabilities) | https://github.com/rocklambros/React2Shell_Hunter | POC Details |
| 139 | CVE-2025-55182 & CVE-2025-66478 Detection Tool for Next.js RSC RCE | https://github.com/alessiodos/react2shell-scanner | POC Details |
| 140 | Patches CVE-2025-55182 in your repositories | https://github.com/Bashamega/react-CVE-2025-55182-fixer | POC Details |
| 141 | More exploit-focused; great for security research repos. | https://github.com/orgito1015/CVE-2025-55182-RCE-Exploit | POC Details |
| 142 | CVE-2025-55182 React Server Components RCE - Go PoC | https://github.com/keklick1337/CVE-2025-55182-golang-PoC | POC Details |
| 143 | React2Shell-Exploit — Complete exploitation framework for CVE-2025-55182, including Python exploit, Docker vulnerable lab, Burp Suite manual and automated exploitation, Nuclei detection template, and validated testing workflow. Developed for penetration testing and educational research. | https://github.com/rubensuxo-eh/react2shell-exploit | POC Details |
| 144 | CVE-2025-55182 RCE - Massive Scanner POC | https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182 | POC Details |
| 145 | Detects exposed React Server Components vulnerable to CVE-2025-55182 via RSC negotiation. | https://github.com/w3irdo21/CVE-2025-55182-react2shell | POC Details |
| 146 | RCE exploitation tool targeting CVE-2025-55182, a critical vulnerability in React Server Components (RSC) affecting React 19.0.0 - 19.2.0 and Next.js applications. | https://github.com/Hghost0x00/CVE-2025-55182 | POC Details |
| 147 | Advanced security testing tool for CVE-2025-55182 vulnerability assessment in Next.js applications. Features interactive shell, batch scanning, WAF bypass, and comprehensive reporting. | https://github.com/zamdevio/r2s | POC Details |
| 148 | React2Shell, CVE-2025-55182, RCE Vulnerability: A critical breakdown of the unsafe deserialization flaw in React Server Components that enables unauthenticated remote code execution across default React/Next.js setups. | https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web | POC Details |
| 149 | Poc for CVE-2025-55182 | https://github.com/0xN7y/CVE-2025-55182 | POC Details |
| 150 | React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0, including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack, contain a remote code execution vulnerability. | https://github.com/MuhammadWaseem29/React2Shell_Rce-cve-2025-55182 | POC Details |
| 151 | CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner) | https://github.com/l0n3m4n/CVE-2025-55182 | POC Details |
| 152 | React Shell & Next.js RSC Exploit Tool (CVE-2025-55182) | https://github.com/ynsmroztas/NextRce | POC Details |
| 153 | A minimal RCE PoC for CVE-2025-55182 | https://github.com/shreyas-malhotra/React2Shell-CVE-2025-55182 | POC Details |
| 154 | CVE-2025-55182 PoC Exploit | https://github.com/sohaibeb/CVE-2025-55182 | POC Details |
| 155 | 🛡️ Complete toolset for detecting and patching CVE-2025-55182 (React2Shell) - A critical CVSS 10.0 RCE vulnerability in React Server Components. Includes automated scanner, patcher, and MCP server integration. | https://github.com/hlsitechio/cve-2025-55182-tools | POC Details |
| 156 | This is a fast, asynchronous Python tool that fingerprints domains for likely Next.js App Router / React Server Components (RSC) infrastructure. (I made it to find the applications possibly vulnerable to CVE-2025-55182 and CVE-2025-66478) | https://github.com/vyvivekyadav04/RSC-Infra-Scanner | POC Details |
| 157 | A modified and a little boosted exploit for CVE-2025-55182, React2Shell: Pre-authentication Remote Code Execution in React Server Packages | https://github.com/MikeTheHash/CVE-2025-55182 | POC Details |
| 158 | Multi-language security scanner with 64 analyzers + AI Agent Security. NEW: React2Shell CVE-2025-55182 detection (CVSS 10.0). Scan Python, JS, Go, Rust, Docker, Terraform, MCP & more. 11,500+ downloads. AGPL-3.0. | https://github.com/Pantheon-Security/medusa | POC Details |
| 159 | CVE-2025-55182 (React2Shell) Scanner | https://github.com/rapticore/ore_react2shell_scanner | POC Details |
| 160 | CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner) | https://github.com/l0n3m4n/CVE-2025-55182-Clean | POC Details |
| 161 | Automated scanner for CVE-2025-55182: a critical RCE vulnerability in React Server Components and Next.js. | https://github.com/Qixinlee/CVE-2025-55182-Scanner | POC Details |
| 162 | Security toolkit to detect CVE-2025-55182 (React2Shell) vulnerability | https://github.com/DelvyGonzalez/react2shell-security-toolkit | POC Details |
| 163 | None | https://github.com/jumodada/react-cve-2025-55182-demo | POC Details |
| 164 | None | https://github.com/ahmedshamsddin/CVE-2025-55182 | POC Details |
| 165 | This is CVE-2025-55182 exploit | https://github.com/LemonTeatw1/CVE-2025-55182-exploit | POC Details |
| 166 | None | https://github.com/mil4ne/CVE-2025-55182-React2Shell- | POC Details |
| 167 | None | https://github.com/ethicalrohitt/React2Shell_cve-2025-55182 | POC Details |
| 168 | This is an easy to use PoC script to exploit React2Shell-CVE-2025-55182 Nextjs vulnerability. This will help to gain a reverse shell. | https://github.com/ihhgimhana/React2Shell-CVE-2025-55182-PoC-Reverse-Shell | POC Details |
| 169 | CVE-2025-55182 Detector. Find which of your GitHub repositories are exposed to the critical React/Next.js RCE vulnerability and generate a clean Markdown report. | https://github.com/shakilkhatri/scanner-for-CVE-2025-55182-vulnerability | POC Details |
| 170 | react2shell PoC with Go / CVE-2025-55182 | https://github.com/UmmItKin/CVE-2025-55182-PoC | POC Details |
| 171 | None | https://github.com/robbin0919/CVE-2025-55182 | POC Details |
| 172 | CVE-2025-55182-POC | https://github.com/zxz3650/CVE-2025-55182-POC | POC Details |
| 173 | Critical RCE vulnerability scanner for React Server Components (CVE-2025-55182). Automated exploitation framework with multi-payload support, proxy capabilities, and interactive command execution. | https://github.com/AliHzSec/CVE-2025-55182 | POC Details |
| 174 | A complete framework for exploiting the vulnerability CVE-2025-55182 | https://github.com/zr0n/react2shell | POC Details |
| 175 | None | https://github.com/hunter24x24/CVE-2025-55182-mass | POC Details |
| 176 | None | https://github.com/andressuarezmonk/CVE-2025-55182 | POC Details |
| 177 | 🔥 React2Shell Toolkit - CVE-2025-55182 & CVE-2025-66478 | https://github.com/cybertechajju/R2C-CVE-2025-55182-66478 | POC Details |
| 178 | None | https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool | POC Details |
| 179 | CVE-2025-55182 – React2Shell: Proof-of-Concept Remote Code Execution (RCE) exploit for Next.js apps. Features an interactive shell prompt to test and demonstrate the vulnerability in real time. Use for security research and authorized penetration-testing only. | https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell | POC Details |
| 180 | A standalone GUI tool to detect and demonstrate the **React Server Components Remote Code Execution (RCE)** vulnerability (CVE-2025-55182) in Next.js applications. | https://github.com/SainiONHacks/CVE-2025-55182-Scanner | POC Details |
| 181 | A bash script to scan your server for React applications vulnerable to **CVE-2025-55182** — a critical remote code execution vulnerability (CVSS 10.0) in React Server Components. | https://github.com/umairahmadh/react-vuln-scanner | POC Details |
| 182 | Torito React2Shell Scanner & Exploit Tool (CVE-2025-55182 / 66478) | https://github.com/ToritoIO/Torito-R2S | POC Details |
| 183 | react2shell CVE-2025-55182 PoC | https://github.com/surajhacx/react2shellpoc | POC Details |
| 184 | Step-by-step walkthrough of CVE-2025-55182 (React2Shell) by tracing React's Flight protocol internals. | https://github.com/kavienanj/CVE-2025-55182 | POC Details |
| 185 | A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution (RCE) vulnerability in React Server Components known as "React2Shell". | https://github.com/websecuritylabs/React2Shell-Library | POC Details |
| 186 | None | https://github.com/cyberleelawat/CVE-2025-55182 | POC Details |
| 187 | High-fidelity RCE scanner for CVE-2025-55182 affecting Next.js RSC. Supports mass scanning, command execution, and automated recon pipelines. Built for pentesters, researchers, and bounty hunters. | https://github.com/satriarizka/CVE-2025-55182-Simple-Scanner | POC Details |
| 188 | [漏洞复现] 全球首款基于RSC特性能绕过WAF检测的CVE-2025-55182 React Server RCE 漏洞 EXP。 | https://github.com/xcanwin/CVE-2025-55182-React-RCE | POC Details |
| 189 | Play with react2shell in a safe environment! | https://github.com/CharlesTheGreat77/CVE-2025-55182-Test-Server | POC Details |
| 190 | * React2Shell-CVE-2025-55182 | https://github.com/ihsansencan/React2Shell-CVE-2025-55182 | POC Details |
| 191 | Header bypass for CVE-2025-55182 (React Server Components RCE). | https://github.com/ejpir/CVE-2025-55182-bypass | POC Details |
| 192 | My research on CVE-2025-55182 | https://github.com/I3r1h0n/React2Shell | POC Details |
| 193 | CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (exploit and scanner) | https://github.com/l0n3m4n/CVE-2025-55182-Waf | POC Details |
| 194 | 🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE-2025-66478, malware, and supply chain attacks. Elementary security for complex codebases! | https://github.com/hlsitechio/shellockolm | POC Details |
| 195 | POC and lab setup | https://github.com/timsonner/React2Shell-CVE-2025-55182 | POC Details |
| 196 | A security scanner for detecting CVE-2025-55182 React Server Components vulnerability | https://github.com/xiaoxiunique/CVE-2025-55182-scanner | POC Details |
| 197 | None | https://github.com/lalaterry/CVE-2025-55182-React2Shell-lab | POC Details |
| 198 | scanner testing | https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478 | POC Details |
| 199 | None | https://github.com/faizdotid/rust-cve-2025-55182 | POC Details |
| 200 | CVE-2025-55182 + CVE-2025-66478 - Next.js/React Server Components Remote Code Execution | https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478 | POC Details |
| 201 | React2Shell Vulnerability | https://github.com/LucasPDiniz/CVE-2025-55182 | POC Details |
| 202 | https://gist.github.com/maple3142/48bc9393f45e068cf8c90ab865c0f5f3 | https://github.com/wangzhengquan/CVE-2025-55182 | POC Details |
| 203 | None | https://github.com/lee191/CVE-2025-55182 | POC Details |
| 204 | CVE-2025-55182 PoC | https://github.com/Night-have-dreams/CVE-2025-55182-PoC | POC Details |
| 205 | ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready | https://github.com/C00LN3T/React2Shell | POC Details |
| 206 | None | https://github.com/thekamran/CVE-2025-55182-Proof-of-Concept | POC Details |
| 207 | A modern, user-friendly GUI application for detecting and exploiting the CVE-2025-55182 vulnerability in React Server Components. Built with Python and Tkinter, featuring a sleek neon-themed interface for scanning targets, executing shell commands, and viewing live console output. | https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE | POC Details |
| 208 | None | https://github.com/0xsj/CVE-2025-55182 | POC Details |
| 209 | a dart package to analyze CVE-2025-55182 react2shell | https://github.com/Benrich127N/react2shell_analyzer | POC Details |
| 210 | CVE-2025-55182 | https://github.com/7amzahard/React2shell | POC Details |
| 211 | CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다. | https://github.com/randarts/react-rce | POC Details |
| 212 | A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable to CVE-2025-55182 (React2Shell) in local projects. | https://github.com/hamm0nz/react2shell-audit | POC Details |
| 213 | None | https://github.com/0xSalm0n/CVE-2025-55182 | POC Details |
| 214 | None | https://github.com/Macaroniwdcheese/CVE-2025-55182-Lab | POC Details |
| 215 | Exploit for CVE-2025-55182 (React4Shell) | https://github.com/LvMalware/CVE-2025-55182 | POC Details |
| 216 | None | https://github.com/HUAHUAI23/CVE-2025-55182-POC | POC Details |
| 217 | Alat ini mendeteksi potensi kerentanan React2Shell (CVE-2025-55182) dalam proyek React dengan memeriksa: - File `package.json` dan file lock untuk paket rentan - Direktori `node_modules` untuk dependensi yang terpengaruh - URL secara pasif untuk deteksi jarak jauh | https://github.com/cahyod/react2shell | POC Details |
| 218 | CVE-2025-55182-scanner with 2 different method | https://github.com/yaupunal/CVE-2025-55182-scanner | POC Details |
| 219 | None | https://github.com/jandelima/cve-2025-55182-poc-test | POC Details |
| 220 | 🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities. | https://github.com/im-ezboy/CVE-2025-55182-zoomeye | POC Details |
| 221 | CVE-2025-55182 Burp Passive Extension | https://github.com/Ibonok/CVE-2025-55182-Burp-Passive-Extension | POC Details |
| 222 | CVE-2025-55182 React2Shell PoC | https://github.com/lowercasenumbers/CVE-2025-55182 | POC Details |
| 223 | [React2Hell] Next.js/React Server RCE Exploit — CVE-2025-55182 | https://github.com/AggressiveUser/React2Hell | POC Details |
| 224 | CVE-2025-55182 Next.js RCE Exploit Tool | https://github.com/racall/cve-2025-55182-node | POC Details |
| 225 | CVE-2025-55182 and CVE-2025-66478 | https://github.com/FurkanKAYAPINAR/ReactNext2Shell | POC Details |
| 226 | rsc-detect-cve-2025-55182 is a static analysis tool designed to detect potential indicators of CVE-2025-55182 | https://github.com/horsenyet/RSC-Detect-CVE-2025-55182 | POC Details |
| 227 | None | https://github.com/LQTjim/next-bug-CVE-2025-55182 | POC Details |
| 228 | Heuristic security scanner for detecting React Server Components (RSC) vulnerabilities, including React2Shell-style behavior (CVE-2025-55182). Safe, non-exploitative, multi-target capable. | https://github.com/AliAbdollahiii/react2shell_detector | POC Details |
| 229 | A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications | https://github.com/xiaopeng-ye/react2shell-detector | POC Details |
| 230 | VulnCheck CVE-2025-55182 react2shell | https://github.com/vulncheck-oss/cve-2025-55182 | POC Details |
| 231 | Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services. | https://github.com/Shield-Cyber/react2shell-scanner | POC Details |
| 232 | None | https://github.com/imbas007/POC-CVE-2025-55182 | POC Details |
| 233 | * React2Shell-CVE-2025-55182 | https://github.com/chitoz1300/React2Shell-CVE-2025-55182 | POC Details |
| 234 | Thực hiện để test CVE 2025 55182 | https://github.com/foodmen2111/test-cve-2025-55182 | POC Details |
| 235 | CVE-2025-55182 检测方式和攻击利用 | https://github.com/sun977/CVE-2025-55182 | POC Details |
| 236 | PoC-react2shell-CVE-2025-55182 | https://github.com/garux-sec/PoC-react2shell-CVE-2025-55182 | POC Details |
| 237 | Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust) | https://github.com/ancs21/react2shell-scanner-rust | POC Details |
| 238 | Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478 | https://github.com/MoisesTapia/http-react2shell | POC Details |
| 239 | None | https://github.com/hadipra5/CVE-2025-55182-Auto-Exploit-Toolkit | POC Details |
| 240 | None | https://github.com/techgaun/cve-2025-55182-scanner | POC Details |
| 241 | React2Shell (CVE-2025-55182) proof-of-concept (PoC) exploit demonstrating a CRITICAL remote code execution (RCE) vulnerability in modern web frameworks using React Server Components (RSC). | https://github.com/rsch-io/CVE-2025-55182-React2Shell | POC Details |
| 242 | None | https://github.com/ilixm/PoC-RCE-CVE-2025-55182 | POC Details |
| 243 | None | https://github.com/iamblacksolo2-BugBounty/POC-CVE-2025-55182 | POC Details |
| 244 | a simple react2shell poc with basic waf bypass | https://github.com/joelvaiju/react2shell-CVE-2025-55182-poc | POC Details |
| 245 | POC-CVE-2025-55182 | https://github.com/DevVaibhav07/POC-CVE-2025-55182 | POC Details |
| 246 | Python3 script that can be used to demonstrate **CVE-2025-55182**. It exploits a server-side JavaScript injection vulnerability in Next.js/React applications, allowing **remote code execution** via malformed multipart form data. | https://github.com/liamromanis101/cve-2025-55182 | POC Details |
| 247 | None | https://github.com/ysfcndgr/React2Shell-CVE-2025-55182-Advanced-Scanner | POC Details |
| 248 | None | https://github.com/alfazhossain/CVE-2025-55182-Exploiter | POC Details |
| 249 | None | https://github.com/keshavyaduvans/cve-2025-55182 | POC Details |
| 250 | proof | https://github.com/byte16384/CVE-2025-55182 | POC Details |
| 251 | POC for React2Shell (CVE-2025-55182) | https://github.com/kondukto-io/vulnerable-next-js-poc | POC Details |
| 252 | Test case for CVE-2025-55182 | https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-webpack | POC Details |
| 253 | Test case for CVE-2025-55182 | https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-parcel | POC Details |
| 254 | Test case for CVE-2025-55182 | https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack | POC Details |
| 255 | None | https://github.com/eytannatye/R2S_CVE-2025-55182 | POC Details |
| 256 | PoC, Hunting React2Shell about CVE-2025-55182 | https://github.com/Jaycelation/CVE-2025-55182 | POC Details |
| 257 | React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC). | https://github.com/shyambhanushali/React2Shell | POC Details |
| 258 | None | https://github.com/amir-malek/react-cve-2025-55182 | POC Details |
| 259 | CVE-2025-55182-advanced-scanner | https://github.com/Ankitspandey07/React2Shell | POC Details |
| 260 | malware I found on my server | https://github.com/Stonelinks/react-cve-2025-55182 | POC Details |
| 261 | A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks that use it like Next.js (CVE-2025-66478). | https://github.com/dr4xp/react2shell | POC Details |
| 262 | Proof of Concept for CVE-2025-55182 ("React2Shell"). A fully dockerized environment demonstrating Remote Code Execution (RCE) via insecure deserialization in React Server Components. Includes vulnerable targets for both Vanilla React (Express) and Next.js, along with a custom Python exploit script. | https://github.com/trax69/cve-2025-55182-poc | POC Details |
| 263 | Demo of CVE-2025-55182 — Next.js RCE (for educational purposes) | https://github.com/osman-butt/CVE-2025-55182-demo | POC Details |
| 264 | None | https://github.com/mil4ne/CVE-2025-55182-React2Shell | POC Details |
| 265 | py script proof of concept new CVE-2025-55182 based in lachlan2k script | https://github.com/notkittenn/poc_react2shell | POC Details |
| 266 | ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell) | https://github.com/theori-io/reactguard | POC Details |
| 267 | None | https://github.com/iamblacksolo2-BugBounty/POC2-CVE-2025-55182 | POC Details |
| 268 | None | https://github.com/BakhodiribnYashinibnMansur/CVE-2025-55182 | POC Details |
| 269 | CVE-2025-55182 React RCE Test Server | https://github.com/theman001/CVE-2025-55182_PoC-Test-Server | POC Details |
| 270 | Next.js RCE via React Server Functions | https://github.com/gunyakit/CVE-2025-55182-PoC-exploit | POC Details |
| 271 | A command-line tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using React Server Components. | https://github.com/rix4uni/CVE-2025-55182 | POC Details |
| 272 | A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182] | https://github.com/gonaumov/cve-2025-55182-checker | POC Details |
| 273 | None | https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell | POC Details |
| 274 | None | https://github.com/Legus-Yeung/CVE-2025-55182-exploit | POC Details |
| 275 | None | https://github.com/DanielXavierJob/-CVE-2025-55182 | POC Details |
| 276 | Reproduction for Next.js CVE-2025-55182 version string confusion issue | https://github.com/sponte/nextjs-cve-version-confusion | POC Details |
| 277 | None | https://github.com/CrazyloveforWeb/Golang-CVE-2025-55182-POC | POC Details |
| 278 | Nmap NSE script for scanning React2Shell (CVE-2025-55182) | https://github.com/JahazielLem/NSE_CVE-2025-55182 | POC Details |
| 279 | Elite exploitation toolkit for CVE-2025-55182 (React Server Components RCE). Async polymorphic payloads, advanced WAF/CDN bypass, proxy rotation, Shodan/Censys mass scan, auto-pwn + reverse shells, Nuclei templates, K8s lab & C2 dashboard. Authored by Sudeepa Wanigarathna – strictly for authorized red team and penetration testing. | https://github.com/CerberusMrX/Cerberus-React2Shell-Scanner-Exploit | POC Details |
| 280 | nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability | https://github.com/Saad-Ayady/react2shellNSE | POC Details |
| 281 | RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-language support. Built with Electron & React. | https://github.com/VeilVulp/RscScan | POC Details |
| 282 | A CTF challenge based on CVE-2025-55182 Vulnerability | https://github.com/yz9yt/React2Shell-CTF | POC Details |
| 283 | None | https://github.com/Gymnott1/CVE-2025-55182 | POC Details |
| 284 | A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE. | https://github.com/J4ck3LSyN-Gen2/CVE-2025-55182 | POC Details |
| 285 | Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components | https://github.com/pkrasulia/CVE-2025-55182-NextJS-RCE-PoC | POC Details |
| 286 | Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server Actions | https://github.com/oscarmine/R2SAE | POC Details |
| 287 | Next.js-Exploit-Tool 图形化综合利用工具,基于 Go 开发,一款针对 CVE-2025-55182 的独立安全评估工具。 | https://github.com/Rsatan/Next.js-Exploit-Tool | POC Details |
| 288 | None | https://github.com/min8282/CVE-2025-55182 | POC Details |
| 289 | Intentionally vulnerable Next.js app for CVE-2025-55182 security research and CTF challenges | https://github.com/Machine-farmer/PunchingBag-for-React2Shell | POC Details |
| 290 | None | https://github.com/exrienz/CVE-2025-55182-NextJS-Scanner-React2Shell-PoC | POC Details |
| 291 | Educational / research tool related to React / Next.js vulnerability CVE‑2025‑55182 (“React2Shell”). | https://github.com/mrmtwoj/React2Shell-CVE-2025-55182 | POC Details |
| 292 | None | https://github.com/xalgord1/CVE-2025-55182-POC | POC Details |
| 293 | None | https://github.com/LC-pro/CVE-2025-55182-EXP | POC Details |
| 294 | This tool is a Proof of Concept (PoC) intended for security research and educational purposes only. Using this tool on systems without explicit permission is illegal and punishable by law. The author (Tiger-Foxx) assumes no responsibility for misuse. | https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182 | POC Details |
| 295 | React2Shell (CVE-2025-55182) scanner | https://github.com/trilogy-group/react2shell-scan | POC Details |
| 296 | Interactive visualization explaining React Server Components, Flight Protocol, and the React2Shell (CVE-2025-55182) RCE vulnerability. Features narrated animations synced with ElevenLabs + Whisper. | https://github.com/VolksRat71/react2shellexploitvisualized | POC Details |
| 297 | A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications | https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension | POC Details |
| 298 | CVE-2025-55182 | https://github.com/andrei2308/react2shell | POC Details |
| 299 | None | https://github.com/Nkwenti-Severian-Ndongtsop/POC_react2shell_CVE-2025-55182 | POC Details |
| 300 | R2S is a comprehensive exploitation and post-exploitation framework targeting the Next.js React Server Components vulnerability (CVE-2025-55182). It provides an interactive shell with advanced features for penetration testing, including file transfer, persistence, enumeration, privilege escalation checks, and more. | https://github.com/4nuxd/React2Shell | POC Details |
| 301 | Burp Suite extension for identifying the React Server Components unsafe deserialization vulnerability (React2Shell / CVE-2025-55182). It provides a focused UI tab, context-menu actions, active-scanner integration, and optional Burp Collaborator confirmation. | https://github.com/j0lt-github/react2shell-burp | POC Details |
| 302 | RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-language support. Built with Electron & React. | https://github.com/VeilVulp/RscScan-cve-2025-55182 | POC Details |
| 303 | CVE-2025-55182 payload | https://github.com/IrsyadSEC/CVE-2025-55182-MassPayloadAttack | POC Details |
| 304 | POC React2Shell-CVE-2025-55182 | https://github.com/Shadowroot97/React2Shell-CVE-2025-55182 | POC Details |
| 305 | None | https://github.com/yuta3003/CVE-2025-55182 | POC Details |
| 306 | None | https://github.com/securifyai/React2Shell-CVE-2025-55182 | POC Details |
| 307 | None | https://github.com/W41T3D3V1L/COMPLETE-CVE-2025-55182 | POC Details |
| 308 | CVE-2025-55182 React2Shell in rust | https://github.com/0x5k/rs_CVE-2025-55182_React2Shell | POC Details |
| 309 | simple Proof-of-Concept (PoC) exploit for CVE-2025-55182 | https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO- | POC Details |
| 310 | CVE-2025-55182 の検証用 | https://github.com/oguri-souhei/CVE-2025-55182 | POC Details |
| 311 | Advanced Exploitation Toolkit for Next.js Server Actions (CVE-2025-55182) | https://github.com/xalgord/React2Shell | POC Details |
| 312 | POC React2Shell - CVE-2025-55182 - CVE-2025-55184 | https://github.com/caohungphu/react2shell | POC Details |
| 313 | None | https://github.com/ryanhafid/PoC_CVE-2025-55182 | POC Details |
| 314 | None | https://github.com/ryanhafid/Scan_CVE-2025-55182 | POC Details |
| 315 | CVE-2025-55182 - React2Shell Educational Tool | https://github.com/0xLutfifakee/CVE-2025-55182-React2Shell | POC Details |
| 316 | CVE-2025-55182 – CVE-2025-66478 – React2Shell | https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182 | POC Details |
| 317 | AI agent-ready prompt to scan Node.js/React/Next.js projects for Shai-Hulud 2.0 (npm worm) and React2Shell (CVE-2025-55182 RCE). Guides AI agents (Claude, Gemini, Grok, etc.) to check dependencies, versions, GitHub repos, detect compromise, and provide step-by-step remediation. | https://github.com/eaizy/react2hulud-scan | POC Details |
| 318 | Security testing toolkit for CVE-2025-55182 - React Server Components RCE via prototype pollution. Includes CLI scanner, Chrome extension, Nuclei templates, and Docker lab with CTF flags. | https://github.com/sho-luv/React2Shell | POC Details |
| 319 | High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478). | https://github.com/h0tak88r/next88 | POC Details |
| 320 | Hack The Box Writeup for Retired Challenge ReactOOPS - Complete solution and educational guide to CVE-2025-55182/CVE-2025-66478 (React2Shell RCE). Includes detailed vulnerability analysis, exploitation techniques, and team learning materials. | https://github.com/TheStingR/ReactOOPS-WriteUp | POC Details |
| 321 | A CLI tool that exploits vulnerabilities in React Server Components and Server Actions (CVE-2025-55182, CVE-2025-66478) to achieve remote code execution (RCE) on vulnerable servers. | https://github.com/mantvmass/react2shell | POC Details |
| 322 | A CVE-2025-55182(React2Shell) Toolbox Application | https://github.com/MoLeft/React2Shell-Toolbox | POC Details |
| 323 | Analysis, Validation Environment, and POC for CVE-225-55182 Vulnerability. | https://github.com/Ya0h4cker/CVE-2025-55182 | POC Details |
| 324 | A research report on CVE-2025-55182 (React2Shell). | https://github.com/Kugelbyte/React2Shell-Analysis | POC Details |
| 325 | A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote Code Execution in React Server Components | https://github.com/dhananjayakumarn/CVE-2025-55182-Lab | POC Details |
| 326 | None | https://github.com/ZorvithonLeo-Null/CVE-2025-55182-exploit | POC Details |
| 327 | NodeJS-based exploit script and scanner for the React Server Components "React2Shell" vulnerability (CVE-2025-55182). | https://github.com/sangleshubham/React-Security-CVE-2025-55182-Exploit | POC Details |
| 328 | A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications. Features combined static code analysis and safe dynamic verification for DevSecOps workflows. | https://github.com/TrixSec/CVE-2025-55182-Scanner | POC Details |
| 329 | Check if your server is affected by CVE-2025-55182 & CVE-2025-66478 | https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478 | POC Details |
| 330 | None | https://github.com/grejh0t/CVE-2025-55182 | POC Details |
| 331 | A modern Next.js vulnerable web app themed as a news / blog portal for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3. | https://github.com/hidden-investigations/react2shell-vulnlab | POC Details |
| 332 | 💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025-55182/83/84) para entornos Next.js y React Server Components (RSC) directamente desde tu navegador ❌ | https://github.com/MammaniNelsonD/React2P4IM0Nshell | POC Details |
| 333 | None | https://github.com/tinashelorenzi/CVE-2025-55182 | POC Details |
| 334 | An advanced command-line framework for discovery, validation, and exploitation of CVE-2025-55182 and CVE-2025-66478 affecting Next.js applications using React Server Components (RSC). | https://github.com/ProwlSec/React2Shell | POC Details |
| 335 | Proof-of-Concept for CVE-2025-55182, a critical unauthenticated RCE in React Server Components. | https://github.com/VVVI5HNU/CVE-2025-55182 | POC Details |
| 336 | CVE-2025-55182-Advanced-Scanner is an automated security tool designed to detect and validate the CVE-2025-55182 vulnerability efficiently. it helps security researchers and bug bounty hunters quickly identify affected targets with accurate results and minimal false positives. | https://github.com/CyberPrince-hub/React2shell-ultimate-scanner | POC Details |
| 337 | Precision-Based Detection of RSC/Next.js Remote Code Execution Vulnerabilities (CVE-2025-55182, CVE-2025-66478) | https://github.com/hidden-investigations/react2shell-scanner | POC Details |
| 338 | None | https://github.com/mivmi/CVE-2025-55182 | POC Details |
| 339 | React2shell-web-scanner | https://github.com/Security-Phoenix-demo/react2shell-scanner-CVE-2025-55182 | POC Details |
| 340 | This project provides a fully functional demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js. | https://github.com/subhdotsol/CVE-2025-55182 | POC Details |
| 341 | cve-2025-55182 | https://github.com/Call123X/-cve-2025-55182 | POC Details |
| 342 | None | https://github.com/hulh122/CVE-2025-55182 | POC Details |
| 343 | None | https://github.com/simantchaudhari/CVE-2025-55182 | POC Details |
| 344 | This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with next.js server | https://github.com/premdanav/react2shelldemo | POC Details |
| 345 | RCE exploitation tool targeting CVE-2025-55182, a critical vulnerability in React Server Components (RSC) affecting React 19.0.0 - 19.2.0 and Next.js applications. | https://github.com/Yyax13/CVE-2025-55182 | POC Details |
| 346 | None | https://github.com/S-Mughal/NextJS-app-CVE-2025-55182 | POC Details |
| 347 | 試してみるよん | https://github.com/itumo-arigatone/study-CVE-2025-55182 | POC Details |
| 348 | CVE-2025-55182 | https://github.com/EQSTLab/CVE-2025-55182 | POC Details |
| 349 | React2Shell Exploitation Tool (CVE-2025-55182) | https://github.com/scumfrog/FiberBreak | POC Details |
| 350 | None | https://github.com/d0cnull/nextjs-CVE-2025-55182 | POC Details |
| 351 | An advanced vulnerability scanner for detecting **CVE-2025-55182** and **CVE-2025-66478** - critical Remote Code Execution (RCE) vulnerabilities in Next.js applications using React Server Components (RSC). | https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478 | POC Details |
| 352 | A proof-of-concept tool for demonstrating the critical React2Shell vulnerability | https://github.com/M4rgs/CVE-2025-55182-React2Shell-Exploit | POC Details |
| 353 | Quyida to‘liq LAB rejasi: demo-vulnerable app → Python PoC → Metasploit exploit skeleton | https://github.com/nulltrace1336/CVE-2025-55182-Metasploit-exploit-skeleton-real-flow- | POC Details |
| 354 | React2shell vulnerable lab (CVE-2025-55182) | https://github.com/pwnxpl0it/react2shell-lab | POC Details |
| 355 | Proof-of-concept research tool for CVE-2025-55182, a critical unauthenticated RCE in Next.js App Router caused by server-side object injection in React Server Components and Server Actions, including UTF-16LE WAF evasion techniques. | https://github.com/ceh-aditya-raj/CVE-2025-55182 | POC Details |
| 356 | High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) | https://github.com/aleksandrova834/react2shell-bypasswaf | POC Details |
| 357 | Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182. | https://github.com/r4j3sh-com/CVE-2025-55182 | POC Details |
| 358 | React2Shell Vulnerability Verification Script (React2Shell also known as CVE-2025-55182). | https://github.com/degenwithheart/React2Shell-Vulnerability-Verification-Script | POC Details |
| 359 | None | https://github.com/rashedhasan090/cve-2025-55182-mitigator | POC Details |
| 360 | React2Shell (CVE-2025-66478): A Python-based Proof of Concept for Critical Remote Code Execution (RCE) in Next.js Server Components. Features an interactive CLI, custom payload injection, and cleaner output formatting. For educational research only. | https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC | POC Details |
| 361 | None | https://github.com/dajneem23/CVE-2025-55182 | POC Details |
| 362 | React2Shell vulnerability (CVE-2025-55182 / CVE-2025-66478) Full Script | https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script | POC Details |
| 363 | None | https://github.com/lamaper/CVE-2025-55182-Toolbox | POC Details |
| 364 | A Python-based security scanner for detecting and exploiting **React Server Components (RSC)** vulnerabilities in Next.js applications. This tool performs passive detection, active fingerprinting, and RCE exploitation testing. | https://github.com/mahaveer-choudhary/CVE-2025-55182 | POC Details |
| 365 | Secure-by-default demo lab showing how container hardening (distroless images, non-root, read-only filesystem, runtime-injected secrets) can neutralize a critical Next.js/React Server Actions RCE (CVE-2025-55182 “React2Shell”), with side-by-side safe vs unsafe deployments and exploit logs | https://github.com/MeGaNeKoS/secure-by-default-rce-demo | POC Details |
| 366 | None | https://github.com/TamaGorengs/react2shell-poc-CVE-2025-55182 | POC Details |
| 367 | None | https://github.com/dbwlsdnr95/CVE-2025-55182-React2Shell-Nextjs-RSC-Analysis | POC Details |
| 368 | A self-hosted vulnerable Next.js environment running on Docker for simulating CVE-2025-55182. Built for educational security research and CTF practice. | https://github.com/xxxTectationxxx/React2Shell-CVE-Lab | POC Details |
| 369 | RSC Detect CVE 2025 55182 | https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182 | POC Details |
| 370 | CVE-2025-55182 React2Shell PoC - RCE via React Server Components | https://github.com/p3ta00/react2shell-poc | POC Details |
| 371 | analyzing the CVE-2025-55182 vulnerability within Next.js Server Actions | https://github.com/niokagi/react-cve-2025-55182 | POC Details |
| 372 | NextJS exploiter for CVE-2025-55182 and more. | https://github.com/vonuyvicoo/nextploiter | POC Details |
| 373 | React2Shell Critical Vulnerability (CVE-2025-55182) | https://github.com/knightwolf01/React2Shell | POC Details |
| 374 | React2Shell: An exploitation framework for CVE-2025-55182 (Next.js/React RCE). | https://github.com/BlackTechX011/React2Shell | POC Details |
| 375 | Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution. | https://github.com/S3cr3t-SDN/React4Shell | POC Details |
| 376 | CVE-2025-55182 & CVE-2025-66478 proof of concepts | https://github.com/aseemyash/krle | POC Details |
| 377 | a controlled environment to test CVE-2025-55182. | https://github.com/ckex/test-vuln | POC Details |
| 378 | Interactive RCE exploitation tool for CVE-2025-55182 (React Server Components) | https://github.com/Anon2Fear/CVE-2025-55182 | POC Details |
| 379 | 🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications. | https://github.com/mayank729/CVE-2025-55182-scanner | POC Details |
| 380 | 🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques. | https://github.com/phornnato/CVE-2025-55182 | POC Details |
| 381 | CVE-2025-55182 React RCE Test Program | https://github.com/theman001/CVE-2025-55182 | POC Details |
| 382 | React2Shell vulnerability verification lab for BreachPilot testing (CVE-2025-55182 simulation) | https://github.com/d01ki/react2shell-lab | POC Details |
| 383 | 🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies. | https://github.com/Farhan9488/CVE-2025-55182-research | POC Details |
| 384 | This is a lab for reproducing CVE-2025-55182. | https://github.com/bigbluewhale111/CVE-2025-55182-LAB | POC Details |
| 385 | 🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication. | https://github.com/Ghost121111/Blackash-CVE-2025-55182 | POC Details |
| 386 | 🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`. | https://github.com/slreaperking/CVE-2025-55182-poc | POC Details |
| 387 | A evolved version of assetnote CVE-2025-55182 scanner | https://github.com/guiimoraes/react2shell-evolved | POC Details |
| 388 | 🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution. | https://github.com/wiixx44/CVE-2025-55182 | POC Details |
| 389 | 🛠️ Share original PoCs for CVE-2025-55182 in React2Shell, showcasing effective remote code execution examples for developers and security researchers. | https://github.com/Huzii11/React2Shell-CVE-2025-55182-original-poc | POC Details |
| 390 | 🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner. | https://github.com/meneim99/react2shell-scanner | POC Details |
| 391 | None | https://github.com/alyaapm/CVE-2025-55182-shellinteractive | POC Details |
| 392 | 🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications. | https://github.com/Mayca369/CVE-2025-55182 | POC Details |
| 393 | 🔍 Exploit CVE-2025-55182 in Next.js with this versatile tool for security research, featuring advanced payloads and WAF bypass techniques. | https://github.com/sobuj0007/Nextjs_RCE_Exploit_Tool | POC Details |
| 394 | None | https://github.com/Jakelife/HACKVISER-CVE-2025-55182-LAB | POC Details |
| 395 | None | https://github.com/thqxploit666/CVE-2025-55182 | POC Details |
| 396 | Mass Bot Exploit | https://github.com/itsismarcos/Bot-exploit-CVE-2025-55182 | POC Details |
| 397 | Exploitation script for CVE-2025-55182. This is modified only for my personal use. If you are facing any problem fix it yourself. | https://github.com/0xROI/CVE-2025-55182 | POC Details |
| 398 | React2Shell Scanner | https://github.com/Updatelap/CVE-2025-55182 | POC Details |
| 399 | ⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code execution tests for React Server Components in Next.js. | https://github.com/9988700/CVE-2025-55182-POC-NEXTJS | POC Details |
| 400 | script to help solve the lab on hackviser covering (CVE-2025-55182) | https://github.com/kanyokoo/React-Server-Components-Remote-Code-Execution-CVE-2025-55182- | POC Details |
| 401 | 🔍 Detect and demonstrate RCE vulnerabilities in React Server Components and Next.js with this comprehensive security research toolkit. | https://github.com/ahmedtouzani/CVE-2025-55182 | POC Details |
| 402 | 🚨 Exploit CVE-2025-55182, a critical RCE vulnerability in React Server Components for Next.js apps; enables testing for prototype pollution risks. | https://github.com/iksanwkk/CVE-2025-55182-exp | POC Details |
| 403 | ⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182 RCE flaw in React Server Components and Next.js applications. | https://github.com/ahmed-dev-op/CVE-2025-55182 | POC Details |
| 404 | 🛠️ Detect and exploit CVE-2025-55182 vulnerabilities in Next.js applications with this easy-to-use command-line scanner. | https://github.com/haftomgu/CVE-2025-55182-advanced-scanner- | POC Details |
| 405 | None | https://github.com/KingHacker353/R2C-CVE-2025-55182-66478 | POC Details |
| 406 | 🛠️ Exploit CVE-2025-55182 in Next.js with this interactive shell tool, enabling security researchers to verify vulnerabilities on authorized targets. | https://github.com/MysticalHearts/CVE-2025-55182-React2Shell-RCE-Shell | POC Details |
| 407 | 🛠️ Exploit CVE-2025-55182 in Next.js with an interactive shell for security testing on authorized targets. Use responsibly for effective vulnerability assessment. | https://github.com/MysticalHearts/mysticalhearts.github.io | POC Details |
| 408 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/React%20Server%20Components%20Flight%20%E5%8D%8F%E8%AE%AE%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%20CVE-2025-55182.md | POC Details |
| 409 | None | https://github.com/pitufo1721/CVE-2025-55182-GodzillaMemoryShell | POC Details |
| 410 | 🛠️ Exploit CVE-2025-55182 effortlessly with this GUI tool for vulnerability detection, command execution, and Shell reverse connections. | https://github.com/vick333-peniel/ReactExploitGUI | POC Details |
| 411 | 🛠️ Exploit CVE-2025-55182 with this GUI tool for vulnerability detection, command execution, and shell access on Windows and macOS systems. | https://github.com/vick333-peniel/vick333-peniel.github.io | POC Details |
| 412 | CVE-2025-55182 | https://github.com/Ashwesker/Ashwesker-CVE-2025-55182 | POC Details |
| 413 | Interactive shell exploitation for CVE-2025-55182 | https://github.com/ogpourya/CVE-2025-55182 | POC Details |
| 414 | CVE-2025-55182 and CVE-2025-66478 | https://github.com/FurkanKAYAPINAR/React-Next-Scanner | POC Details |
| 415 | None | https://github.com/amirali-ramezani/react2shell-CVE-2025-55182- | POC Details |
| 416 | This repository provides a proof-of-concept for CVE-2025-55182 (React2Shell), a remote code execution vulnerability in React Server Components. It demonstrates how the exploit works, including the payload and impact. | https://github.com/git0xLai/React2ShellPoC | POC Details |
| 417 | 🎯 Automated vulnerability scanner for React2Shell RCE - Google dorking + safe detection for CVE-2025-55182/CVE-2025-66478 (CVSS 10.0) | https://github.com/hndko/react2shell-rce-autobot | POC Details |
| 418 | None | https://github.com/Goultarde/CVE-2025-55182-React2Shell-Lab | POC Details |
| 419 | CVE-2025-55182(React Server Components 反序列化远程代码执行漏洞) | https://github.com/xiaoLvChen/CVE-2025-55182 | POC Details |
| 420 | 🛡️ Scan and assess vulnerabilities in Next.js/Waku with the CVE-2025-55182-Scanner, combining static and dynamic analysis for robust security. | https://github.com/captain4554/CVE-2025-55182-Scanner | POC Details |
| 421 | 🔍 Scan for CVE-2025-55182 vulnerabilities with a hybrid tool that combines static and dynamic analysis for improved security assessments. | https://github.com/captain4554/captain4554.github.io | POC Details |
| 422 | CVE-2025-55182 - Tool React2Shell | https://github.com/ghostn4444/CVE-2025-55182 | POC Details |
| 423 | A HackIndex.io sandbox environment for the React2Shell vulnerability. | https://github.com/HackIndex-io/React2Shell-CVE-2025-55182 | POC Details |
| 424 | RSC Detect CVE 2025 55182 | https://github.com/vrx7men2/RSC-Detect-CVE-2025-55182 | POC Details |
| 425 | None | https://github.com/rahuulmiishra/react2shell-CVE-2025-55182 | POC Details |
| 426 | CVE-2025-55182 漏洞检测与利用工具(GUI版) | https://github.com/m3ngx1ng/CVE-2025-55182-GUI | POC Details |
| 427 | React2Shell – CVE-2025-55182 | https://github.com/tiago4lexandre/React2Shell | POC Details |
| 428 | None | https://github.com/joaovicdev/EXPLOIT-CVE-2025-55182 | POC Details |
| 429 | React2Shell CVE-2025-55182: unauthenticated unsafe deserialization in React Server Components leading to reliable remote code execution via the Flight protocol. | https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182 | POC Details |
| 430 | 🔍 Discover and scan vulnerable Next.js instances to protect your infrastructure from critical RCE vulnerabilities like CVE-2025-55182. | https://github.com/gahoole77/gahoole77.github.io | POC Details |
| 431 | Nextjs RCE Exploit | https://github.com/lucyz1125/CVE-2025-55182-Next.js-RCE | POC Details |
| 432 | next.js rce exploit | https://github.com/hyan0116/Next.js-RCE-CVE-2025-55182 | POC Details |
| 433 | "Once upon a time, the Castle of Reactland trusted all Flight messages... until The Imposter arrived." A storytelling CVE-2025-55182 (React2Shell) demo - Medieval-themed vulnerable React Server Components app for security education. | https://github.com/MyCompanyOrganization/React2Shell-Kingdom | POC Details |
| 434 | Simple Lab for React2Shell CVE-2025-55182 | https://github.com/shibaaa204/React2Shell | POC Details |
| 435 | CVE-2025-55182-poc-json | https://github.com/en0f/CVE-2025-55182-poc-json | POC Details |
| 436 | CVE-2025-55182-bypass-waf | https://github.com/momika233/CVE-2025-55182-bypass | POC Details |
| 437 | 🔍 Exploit CVE-2025-55182 vulnerabilities in Next.js and React with this efficient framework for rapid testing and assessment. | https://github.com/Asder10/React2Shell | POC Details |
| 438 | 🛠️ Exploit CVE-2025-55182 using React2Shell, an advanced framework for Next.js and React remote code execution. Secure your applications effectively. | https://github.com/Asder10/asder10.github.io | POC Details |
| 439 | None | https://github.com/mooowu/cve-2025-55182-poc | POC Details |
| 440 | CVE-2025-55182漏洞检测工具 | https://github.com/Faithtiannn/CVE-2025-55182 | POC Details |
| 441 | React2Shell is a high-performance vulnerability scanner written in Go, specifically designed to detect Server-Side Remote Code Execution (RCE) vulnerabilities in Next.js applications (CVE-2025-55182 & CVE-2025-66478). | https://github.com/termireum/react2shell | POC Details |
| 442 | Remote code execution for React Server Components 19.0.0 - 19.2.0 | https://github.com/Least-Significant-Bit/CVE-2025-55182 | POC Details |
| 443 | None | https://github.com/faisha1311/React2Shell-CVE-2025-55182-TryHackMe | POC Details |
| 444 | RSC Detect CVE 2025 55182 | https://github.com/fBUZk2BH/RSC-Detect-CVE-2025-55182 | POC Details |
| 445 | CVE-2025-55182 | https://github.com/shen771/Blackash-CVE-2025-55182 | POC Details |
| 446 | None | https://github.com/greenheadHQ/CVE-2025-55182 | POC Details |
| 447 | Play with react2shell in a safe environment! | https://github.com/DoobTheGoober/CVE-2025-55182-Test-Server | POC Details |
| 448 | None | https://github.com/rahul-securify/React2Shell-CVE-2025-55182 | POC Details |
| 449 | None | https://github.com/dbwlsdnr95/CVE-2025-55182 | POC Details |
| 450 | RCE exploit PoC for CVE-2025-55182 and CVE-2025-66478 in Next.js and React Server Components with scanner and exploitation tools. | https://github.com/jensnesten/React2Shell-PoC | POC Details |
| 451 | CVE-2025-55182(命令执行、反弹shell、注入内存马) | https://github.com/BBD-YZZ/CVE-2025-55182 | POC Details |
| 452 | None | https://github.com/Vladjrfhfg/React-site-CVE-2025-55182 | POC Details |
| 453 | CVE-2025-55182 React Server Components Remote Code Execution Exploit Lab | https://github.com/Namsom007/CVE-2025-55182-Exploit | POC Details |
| 454 | CVE-2025-55182 | https://github.com/MemerGamer/CVE-2025-55182 | POC Details |
| 455 | None | https://github.com/Sairbo/Unihackers---CVE-2025-55182- | POC Details |
| 456 | This is a security exploit tool targeting CVE-2025-55182. It exploits a Remote Code Execution (RCE) vulnerability in React Server Components | https://github.com/AsadAhmad-1337/React-2-Shell | POC Details |
| 457 | None | https://github.com/deepankarkumar1/CVE-2025-55182_Vulnerable-Application | POC Details |
| 458 | React2shell exploit (CVE-2025-55182+CVE-2025-66478) | https://github.com/wnaspy/CVE-2025-55182 | POC Details |
| 459 | [우리 FISA] 기술 세미나 우승 - 클라우드 서비스 개발 6기 3팀 - React2Shell (CVE-2025-55182) 분석 및 연구 | https://github.com/woorifisa-service-dev-6th/tech-seminar-React2Shell | POC Details |
| 460 | A Firefox extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications. | https://github.com/MuhammadUwais/React2Shell | POC Details |
| 461 | None | https://github.com/Evillm/CVE-2025-55182-PoC | POC Details |
| 462 | An exploitation tool for the Next.js vulnerability CVE-2025-55182 that allows remote command execution through a poisoning prototype in React Server Components. | https://github.com/BrianLopezM99/react2shell-CVE-2025-55182 | POC Details |
| 463 | None | https://github.com/George0Papasotiriou/CVE-2025-55182-React2Shell-CVSS-10.0- | POC Details |
| 464 | RCE on Next 16.0.6 | https://github.com/atiilla/CVE-2025-55182 | POC Details |
| 465 | React2Shell (CVE-2025-55182) POC | https://github.com/snipevx/React2Shell-POC | POC Details |
| 466 | None | https://github.com/BIG02-bot/React2Shell-CVE-2025-55182-An-lise-T-cnica | POC Details |
| 467 | 针对 Next.js 原型污染漏洞 (CVE-2025-55182) 的高效批量检测工具。 | https://github.com/Wyl-cmd/CVE-2025-55182 | POC Details |
| 468 | Server Next.js old version in docker | https://github.com/DeDnY/CVE-2025-55182-in-docker | POC Details |
| 469 | Interactive shell client for React Server Components RCE exploitation via __proto__ pollution (CVE-2025-55182) | https://github.com/H4R335HR/reactshell | POC Details |
| 470 | CVE-2025-55182 | https://github.com/zaryouhashraf/CVE-2025-55182 | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.