Security researchers have released React Server Components Surface Exposure Scanner, a free tool to detect exposed endpoints vulnerable to CVE-2025-55182.
This critical remote code execution (RCE) flaw in React Server Components (RSC) affects Next.js apps using React 19.
With a perfect CVSS score of 10.0, it allows attackers to run arbitrary code if chained with a prototype pollution attack.
The GitHub repo (fatguru/CVE-2025-55182-scanner) provides non-intrusive scanning to spot attack surfaces before exploitation.
Next.js production builds use a server Manifest allowlist to block dangerous modules, such as child_process.
Direct RCE fails without polluting this manifest in memory. Webpack minification obfuscates module IDs (e.g., “vm” becomes “742”), leading to false negatives in rigid PoCs.
Root paths often redirect POST requests, resulting in lost payloads. This scanner bypasses these issues with innovative probing.
CVE-2025-55182 requires an exposed RSC endpoint (text/x-component protocol) as the first step in attacks.
Standard scanners fail due to:
| CVE Detail | Value |
|---|---|
| ID | CVE-2025-55182 |
| CVSS v3.1 Score | 10.0 (Critical) |
| Type | RCE via RSC |
| Affected | React 19/Next.js App Router |
| Patch Status | Patch RSC parsing; harden manifests |
| Source | NVD |
The tool fingerprints via a safe payload [“$1:aa:aa”], triggering React 19’s unique “Digest” error on exposed servers.
It probes random paths (e.g., /x7z9q2) to avoid redirects and works on minified builds.
Basic scan: python3 cve_2025_55182_scanner.py -u http://target.com/dashboard
Bulk: python3 cve_2025_55182_scanner.py -l targets.txt -o results.csv
Custom: Add –header “Cookie: session=123” or -k for insecure TLS.
v2.1 adds WAF detection (403/406 blocks), threads (-t 10), and verbose logs.
| Result Color/Status | Meaning |
|---|---|
| [EXPOSED] 🔴 | Digest error: Vulnerable surface |
| [SUSPICIOUS] 🟡 | 500 crash: Potential risk |
| [INFO] 🔵 | RSC detected, likely patched |
| [BLOCKED] 🟣 | WAF active (good defense) |
| [SAFE] 🟢 | No exposure |
A Nuclei template (cve-2025-55182-detection.yaml) integrates with ProjectDiscovery. Use it to secure Next.js apps amid rising supply chain risks.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…