<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CloudGuard WAF Pre-emptively Block the React2Shell Zero-Day (CVE-2025-55182) in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/264490#M360</link>
    <description>&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;React Server Components (RSC) and Server Functions in React 19 are at the center of a new critical vulnerability, &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVE‑2025‑55182&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, widely referred to as &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;React2Shell&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. The issue is rated &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVSS 10.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and allows an unauthenticated remote attacker to achieve &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;remote code execution (RCE)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;on servers handling RSC traffic.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;In this post we’ll briefly cover the impact, who is affected, what you should do now, and how &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;CloudGuard WAF&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;(and the open‑source &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;open‑appsec&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;engine) provide &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;preemptive protection&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, including against the recently released public proof‑of‑concept (PoC) exploits.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block4"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-gin4w34989" class="yIaPa"&gt;
&lt;DIV class="j6j2T"&gt;
&lt;FIGURE class="Berpf" data-hook="figure-IMAGE"&gt;
&lt;DIV class="-Jv3q" data-hook="image-viewer"&gt;
&lt;DIV id="gin4w34989" class="qgjoK el5fm o2n-a" data-hook="image-viewer-gin4w34989"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Vani_0-1764928941211.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32316i68B83EA77DA5E75C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Vani_0-1764928941211.png" alt="Vani_0-1764928941211.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;H2 class="bk4bG b3yOZ KVAVd sDlj2" dir="auto"&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="viewer-3mw6l1593" class="bk4bG b3yOZ KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="Tcz9z"&gt;&lt;SPAN&gt;Understanding React2Shell (CVE‑2025‑55182)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block9"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;The React team has disclosed an &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;unauthenticated RCE vulnerability in React Server Components&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, specifically in how React decodes payloads sent to &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;React Server Function endpoints&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block10"&gt;&lt;SPAN&gt;An attacker can:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block12"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Send a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;specially crafted HTTP request&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to a Server Function endpoint in a vulnerable deployment, and&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Have that payload &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;deserialized in a way that leads to arbitrary code execution&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;on the server, with no authentication and no user interaction required.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block13"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-ymrc92528" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Because RSC / Server Functions are increasingly used in modern React and Next.js applications as core plumbing, this turns into a &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;high‑impact server‑side vulnerability&lt;/STRONG&gt;&lt;SPAN&gt;, comparable in urgency to other critical deserialization bugs.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block15"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-ogwno1670" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block16"&gt;&lt;SPAN&gt;Affected packages and frameworks&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block18"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-i97lt3619" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN&gt;According to the official React advisory and GitHub’s CVE record, the vulnerability affects the following &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;React server‑side packages&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block20"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-6dz1o3137" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block21"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;react-server-dom-webpack&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;react-server-dom-parcel&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;react-server-dom-turbopack&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block22"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-m7gmt2931" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;FONT size="3"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Vulnerable React versions&lt;/SPAN&gt;&lt;/FONT&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-hcrs25971" class="yIaPa"&gt;
&lt;DIV class="_4Q7ff rsLFN"&gt;
&lt;DIV class="_35Q60"&gt;
&lt;TABLE class="WzFEw" style="height: 294px; border-style: solid; width: 233px;" width="233" data-hook="table-component"&gt;&lt;COLGROUP&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TH class="lYhsY IWVAe" width="116.667px" height="74px" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;STRONG&gt;&lt;SPAN class="GnvzP"&gt;The issue is present in&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TH&gt;
&lt;TH class="lYhsY IWVAe" width="115.667px" height="74px" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;STRONG&gt;&lt;SPAN class="GnvzP"&gt;fixed in&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="116.667px" height="39px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="115.667px" height="39px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.0.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="116.667px" height="61px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.1.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="_4sATx"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="115.667px" height="61px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.1.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="_4sATx"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="116.667px" height="59px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.1.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="115.667px" height="59px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.1.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="116.667px" height="61px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.2.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="_4sATx"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="115.667px" height="61px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.2.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-s6bx74249" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block26"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Affected frameworks and ecosystems&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block28"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-o98mf9512" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Several popular frameworks and tools that depend on these RSC packages are also affected, including:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block30"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js 15.x and 16.x (App Router)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Affected ranges include multiple 15.x and 16.x releases, as well as canary builds starting from &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;14.3.0‑canary.77&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Patched stable versions include &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block33"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;React Router (unstable RSC APIs)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Waku&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Redwood SDK&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;@vitejs/plugin-rsc&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;@parcel/rsc&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block34"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;If your React application:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block36"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;does &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;run on a server (pure client‑side only), or&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;does &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;use a framework / bundler that supports RSC,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block37"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;then it is &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not affected&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;by CVE‑2025‑55182.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block38"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-tvmmo9997" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block39"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;CloudGuard WAF &amp;amp; open‑appsec: pre‑emptive protection&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block41"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-zs27u10404" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;CloudGuard WAF and &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;open‑appsec&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;use a &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;signature‑less, machine‑learning‑based engine&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;that analyzes full HTTP requests, including complex, nested payloads such as those used by React Server Components and Server Functions.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block43"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Instead of matching only on static strings, the engine:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block45"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Fully &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;decodes&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;bodies (JSON, multipart, nested structures).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Understands &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;parameter relationships&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and request context (method, headers, path, content type).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Scores requests based on patterns consistent with &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;deserialization abuse and remote code execution&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, not just classic SQLi/XSS signatures.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block46"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;As public &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;React2Shell PoC exploits&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;for CVE‑2025‑55182 became available, we replayed them in a controlled lab environment against applications using vulnerable React/Next.js stacks. In these tests:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block48"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-q5s0910303" dir="ltr"&gt;
&lt;BLOCKQUOTE class="_9BhPs"&gt;
&lt;DIV id="viewer-6mxqa10304" class="KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;CloudGuard WAF and open‑appsec pre‑emptively blocked the exploit traffic, even before deploying any CVE‑specific virtual patch updates.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block49"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;This aligns with what we’ve consistently seen in previous zero‑days: once an exploit relies on abnormal protocol usage, deserialization tricks, or server‑side execution primitives, the ML‑based detection has a strong signal - even when the vulnerability itself is newly disclosed.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block50"&gt;&lt;SPAN&gt;We are now complementing this existing protection with &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;dedicated complementary rules&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;tailored for React Server Components traffic, further tightening coverage while preserving low false‑positive rates.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block52"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-kuqj718750" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block53"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;What should you do now?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block55"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-xzs5x19834" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block56"&gt;&lt;SPAN&gt;1. Identify whether you are affected&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block57"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-73qpg20113" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;You should treat this as an &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;emergency patching event&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;if:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block59"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;You are using React 19 with &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Server Components / Server Functions&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, and&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Your stack relies on any of the affected packages or frameworks listed above.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block60"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-5afw020953" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;In particular, you are likely affected if you run:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block62"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;with the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;App Router&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;on versions:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;15.x or 16.x prior to the patched releases, or&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;14.3 canary builds from &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;14.3.0‑canary.77&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;onward.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block64"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;React applications using &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;experimental RSC features&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;in React Router, Waku, Redwood SDK, Vite RSC plugin, or Parcel RSC.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;H3 id="viewer-1f8d622352" class="Njwtn b3yOZ KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="Tcz9z"&gt;&lt;SPAN&gt;2. Upgrade immediately&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block67"&gt;&lt;SPAN&gt;Follow the official guidance from the React and Next.js teams:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block69"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;React server components packages &lt;/SPAN&gt;&lt;/STRONG&gt; &lt;SPAN&gt;Upgrade to &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.0.1, 19.1.2, or 19.2.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;for:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;react-server-dom-webpack&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;react-server-dom-parcel&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;react-server-dom-turbopack&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block71"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js (App Router)&lt;/SPAN&gt;&lt;/STRONG&gt; &lt;SPAN&gt;Upgrade to the latest patched release in your branch&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;If you are on &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js 14.3.0‑canary.77 or later canaries&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, downgrade to a stable 14.x release&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block73"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Other RSC‑enabled frameworks and tools&lt;/SPAN&gt;&lt;/STRONG&gt; &lt;SPAN&gt;Follow the upgrade instructions from the React blog and each vendor (React Router, Redwood SDK, Waku, @vitejs/plugin-rsc, @parcel/rsc).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block74"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-e757a28187" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;3. Harden your perimeter&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block76"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-bipv61823" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN&gt;Even after patching, we strongly recommend keeping &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;CloudGuard AppSec / open‑appsec&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;in &lt;/SPAN&gt;&lt;EM style="font-family: inherit; background-color: #ffffff;"&gt;Prevent&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;mode for internet‑facing applications using React 19 and RSC‑aware frameworks.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block78"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-c6hbn29944" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block79"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block79"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVE‑2025‑55182 (React2Shell)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;is a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;critical, unauthenticated RCE&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;in React Server Components / Server Functions with a CVSS score of &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;10.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;It impacts React 19 server packages (react-server-dom-*) and popular frameworks including &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js 15.x/16.x App Router&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and several other RSC‑enabled ecosystems.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Organizations should &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;upgrade immediately&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to fixed versions of React, Next.js, and any affected RSC tooling, following the official guidance.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;In parallel, &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;CloudGuard WAF and open‑appsec&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;have already demonstrated &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;pre‑emptive blocking&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;of the newly released PoC exploit traffic for this CVE, thanks to their contextual, ML‑based detection of deserialization and RCE behavior - providing an important safety net while patches are rolled out and as exploit techniques evolve.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block83"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-vj3y11925" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block84"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-nt7972384" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block85"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-z7j8c1182" class="yIaPa"&gt;
&lt;DIV class="j6j2T rsLFN"&gt;
&lt;DIV class="xJEpT" role="separator" data-hook="divider divider-single" aria-orientation="horizontal"&gt;
&lt;DIV class="GWbL4"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 05 Dec 2025 21:45:03 GMT</pubDate>
    <dc:creator>Vani</dc:creator>
    <dc:date>2025-12-05T21:45:03Z</dc:date>
    <item>
      <title>CloudGuard WAF Pre-emptively Block the React2Shell Zero-Day (CVE-2025-55182)</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/264490#M360</link>
      <description>&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;React Server Components (RSC) and Server Functions in React 19 are at the center of a new critical vulnerability, &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVE‑2025‑55182&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, widely referred to as &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;React2Shell&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. The issue is rated &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVSS 10.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and allows an unauthenticated remote attacker to achieve &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;remote code execution (RCE)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;on servers handling RSC traffic.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;In this post we’ll briefly cover the impact, who is affected, what you should do now, and how &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;CloudGuard WAF&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;(and the open‑source &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;open‑appsec&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;engine) provide &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;preemptive protection&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, including against the recently released public proof‑of‑concept (PoC) exploits.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block4"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-gin4w34989" class="yIaPa"&gt;
&lt;DIV class="j6j2T"&gt;
&lt;FIGURE class="Berpf" data-hook="figure-IMAGE"&gt;
&lt;DIV class="-Jv3q" data-hook="image-viewer"&gt;
&lt;DIV id="gin4w34989" class="qgjoK el5fm o2n-a" data-hook="image-viewer-gin4w34989"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Vani_0-1764928941211.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32316i68B83EA77DA5E75C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Vani_0-1764928941211.png" alt="Vani_0-1764928941211.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;H2 class="bk4bG b3yOZ KVAVd sDlj2" dir="auto"&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="viewer-3mw6l1593" class="bk4bG b3yOZ KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="Tcz9z"&gt;&lt;SPAN&gt;Understanding React2Shell (CVE‑2025‑55182)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block9"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;The React team has disclosed an &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;unauthenticated RCE vulnerability in React Server Components&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, specifically in how React decodes payloads sent to &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;React Server Function endpoints&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block10"&gt;&lt;SPAN&gt;An attacker can:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block12"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Send a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;specially crafted HTTP request&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to a Server Function endpoint in a vulnerable deployment, and&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Have that payload &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;deserialized in a way that leads to arbitrary code execution&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;on the server, with no authentication and no user interaction required.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block13"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-ymrc92528" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Because RSC / Server Functions are increasingly used in modern React and Next.js applications as core plumbing, this turns into a &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;high‑impact server‑side vulnerability&lt;/STRONG&gt;&lt;SPAN&gt;, comparable in urgency to other critical deserialization bugs.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block15"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-ogwno1670" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block16"&gt;&lt;SPAN&gt;Affected packages and frameworks&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block18"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-i97lt3619" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN&gt;According to the official React advisory and GitHub’s CVE record, the vulnerability affects the following &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;React server‑side packages&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block20"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-6dz1o3137" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block21"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;react-server-dom-webpack&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;react-server-dom-parcel&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;react-server-dom-turbopack&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block22"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-m7gmt2931" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;FONT size="3"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Vulnerable React versions&lt;/SPAN&gt;&lt;/FONT&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-hcrs25971" class="yIaPa"&gt;
&lt;DIV class="_4Q7ff rsLFN"&gt;
&lt;DIV class="_35Q60"&gt;
&lt;TABLE class="WzFEw" style="height: 294px; border-style: solid; width: 233px;" width="233" data-hook="table-component"&gt;&lt;COLGROUP&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TH class="lYhsY IWVAe" width="116.667px" height="74px" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;STRONG&gt;&lt;SPAN class="GnvzP"&gt;The issue is present in&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TH&gt;
&lt;TH class="lYhsY IWVAe" width="115.667px" height="74px" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;STRONG&gt;&lt;SPAN class="GnvzP"&gt;fixed in&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="116.667px" height="39px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="115.667px" height="39px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.0.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="116.667px" height="61px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.1.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="_4sATx"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="115.667px" height="61px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.1.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="_4sATx"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="116.667px" height="59px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.1.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="115.667px" height="59px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.1.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="116.667px" height="61px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.2.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="_4sATx"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="115.667px" height="61px" class="lYhsY" data-hook="table-plugin-cell"&gt;
&lt;DIV class="vVUcC J7U-Q"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.2.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-s6bx74249" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block26"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Affected frameworks and ecosystems&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block28"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-o98mf9512" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Several popular frameworks and tools that depend on these RSC packages are also affected, including:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block30"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js 15.x and 16.x (App Router)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Affected ranges include multiple 15.x and 16.x releases, as well as canary builds starting from &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;14.3.0‑canary.77&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Patched stable versions include &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block33"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;React Router (unstable RSC APIs)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Waku&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Redwood SDK&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;@vitejs/plugin-rsc&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;@parcel/rsc&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block34"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;If your React application:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block36"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;does &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;run on a server (pure client‑side only), or&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;does &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;use a framework / bundler that supports RSC,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block37"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;then it is &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not affected&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;by CVE‑2025‑55182.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block38"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-tvmmo9997" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block39"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;CloudGuard WAF &amp;amp; open‑appsec: pre‑emptive protection&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block41"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-zs27u10404" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;CloudGuard WAF and &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;open‑appsec&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;use a &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;signature‑less, machine‑learning‑based engine&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;that analyzes full HTTP requests, including complex, nested payloads such as those used by React Server Components and Server Functions.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block43"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Instead of matching only on static strings, the engine:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block45"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Fully &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;decodes&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;bodies (JSON, multipart, nested structures).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Understands &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;parameter relationships&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and request context (method, headers, path, content type).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Scores requests based on patterns consistent with &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;deserialization abuse and remote code execution&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, not just classic SQLi/XSS signatures.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block46"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;As public &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;React2Shell PoC exploits&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;for CVE‑2025‑55182 became available, we replayed them in a controlled lab environment against applications using vulnerable React/Next.js stacks. In these tests:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block48"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-q5s0910303" dir="ltr"&gt;
&lt;BLOCKQUOTE class="_9BhPs"&gt;
&lt;DIV id="viewer-6mxqa10304" class="KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;CloudGuard WAF and open‑appsec pre‑emptively blocked the exploit traffic, even before deploying any CVE‑specific virtual patch updates.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block49"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;This aligns with what we’ve consistently seen in previous zero‑days: once an exploit relies on abnormal protocol usage, deserialization tricks, or server‑side execution primitives, the ML‑based detection has a strong signal - even when the vulnerability itself is newly disclosed.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block50"&gt;&lt;SPAN&gt;We are now complementing this existing protection with &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;dedicated complementary rules&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;tailored for React Server Components traffic, further tightening coverage while preserving low false‑positive rates.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block52"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-kuqj718750" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block53"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;What should you do now?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block55"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-xzs5x19834" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block56"&gt;&lt;SPAN&gt;1. Identify whether you are affected&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block57"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-73qpg20113" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;You should treat this as an &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;emergency patching event&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;if:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block59"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;You are using React 19 with &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Server Components / Server Functions&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, and&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Your stack relies on any of the affected packages or frameworks listed above.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block60"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-5afw020953" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;In particular, you are likely affected if you run:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block62"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;with the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;App Router&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;on versions:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;15.x or 16.x prior to the patched releases, or&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;14.3 canary builds from &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;14.3.0‑canary.77&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;onward.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block64"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;React applications using &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;experimental RSC features&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;in React Router, Waku, Redwood SDK, Vite RSC plugin, or Parcel RSC.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;H3 id="viewer-1f8d622352" class="Njwtn b3yOZ KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="Tcz9z"&gt;&lt;SPAN&gt;2. Upgrade immediately&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block67"&gt;&lt;SPAN&gt;Follow the official guidance from the React and Next.js teams:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block69"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;React server components packages &lt;/SPAN&gt;&lt;/STRONG&gt; &lt;SPAN&gt;Upgrade to &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;19.0.1, 19.1.2, or 19.2.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;for:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;react-server-dom-webpack&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;react-server-dom-parcel&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="2"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;react-server-dom-turbopack&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block71"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js (App Router)&lt;/SPAN&gt;&lt;/STRONG&gt; &lt;SPAN&gt;Upgrade to the latest patched release in your branch&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;If you are on &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js 14.3.0‑canary.77 or later canaries&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, downgrade to a stable 14.x release&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block73"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Other RSC‑enabled frameworks and tools&lt;/SPAN&gt;&lt;/STRONG&gt; &lt;SPAN&gt;Follow the upgrade instructions from the React blog and each vendor (React Router, Redwood SDK, Waku, @vitejs/plugin-rsc, @parcel/rsc).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block74"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-e757a28187" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;3. Harden your perimeter&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block76"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-bipv61823" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN&gt;Even after patching, we strongly recommend keeping &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;CloudGuard AppSec / open‑appsec&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;in &lt;/SPAN&gt;&lt;EM style="font-family: inherit; background-color: #ffffff;"&gt;Prevent&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;mode for internet‑facing applications using React 19 and RSC‑aware frameworks.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block78"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-c6hbn29944" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block79"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block79"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;UL class="_4ZJKX KVAVd"&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVE‑2025‑55182 (React2Shell)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;is a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;critical, unauthenticated RCE&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;in React Server Components / Server Functions with a CVSS score of &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;10.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;It impacts React 19 server packages (react-server-dom-*) and popular frameworks including &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next.js 15.x/16.x App Router&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and several other RSC‑enabled ecosystems.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;Organizations should &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;upgrade immediately&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to fixed versions of React, Next.js, and any affected RSC tooling, following the official guidance.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="qUi3b" dir="auto" aria-level="1"&gt;
&lt;P class="IFLJx f1-1G KVAVd sDlj2"&gt;&lt;SPAN class="GnvzP"&gt;&lt;SPAN&gt;In parallel, &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;CloudGuard WAF and open‑appsec&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;have already demonstrated &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;pre‑emptive blocking&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;of the newly released PoC exploit traffic for this CVE, thanks to their contextual, ML‑based detection of deserialization and RCE behavior - providing an important safety net while patches are rolled out and as exploit techniques evolve.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block83"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-vj3y11925" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block84"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-nt7972384" class="IFLJx f1-1G KVAVd sDlj2" dir="auto"&gt;&lt;SPAN class="GnvzP"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block85"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-breakout="normal"&gt;
&lt;DIV id="viewer-z7j8c1182" class="yIaPa"&gt;
&lt;DIV class="j6j2T rsLFN"&gt;
&lt;DIV class="xJEpT" role="separator" data-hook="divider divider-single" aria-orientation="horizontal"&gt;
&lt;DIV class="GWbL4"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 05 Dec 2025 21:45:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/264490#M360</guid>
      <dc:creator>Vani</dc:creator>
      <dc:date>2025-12-05T21:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard WAF Pre-emptively Block the React2Shell Zero-Day (CVE-2025-55182)</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/264650#M361</link>
      <description>&lt;P&gt;Excellent!&lt;/P&gt;</description>
      <pubDate>Sat, 06 Dec 2025 17:19:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/264650#M361</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-06T17:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard WAF Pre-emptively Block the React2Shell Zero-Day (CVE-2025-55182)</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/264959#M362</link>
      <description>&lt;P&gt;Hi Vani,&lt;/P&gt;&lt;P&gt;I understand that checkpoint offers protection via WAF and IPS signature, but&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there an official statement from Checkpoint for all of there products ?&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Pierre&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 08:15:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/264959#M362</guid>
      <dc:creator>Patrice_Roggema</dc:creator>
      <dc:date>2025-12-10T08:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard WAF Pre-emptively Block the React2Shell Zero-Day (CVE-2025-55182)</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/265049#M363</link>
      <description>&lt;P&gt;We're not vulnerable.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 22:56:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/265049#M363</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-12-10T22:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard WAF Pre-emptively Block the React2Shell Zero-Day (CVE-2025-55182)</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/265051#M364</link>
      <description>&lt;P&gt;Excellent.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 23:09:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-WAF-Pre-emptively-Block-the-React2Shell-Zero-Day-CVE/m-p/265051#M364</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-10T23:09:38Z</dc:date>
    </item>
  </channel>
</rss>

