Skip to content

Conversation

@carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

  • Blog URL: https://github.com/Spritualkb/CVE-2025-55182-exp
  • Blog Title: CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
  • Suggested Section: Pentesting Web -> NextJS (or, alternatively, Pentesting Web -> NodeJS Express / Prototype Pollution & Deserialization) with a subsection on "React Server Components Flight protocol deserialization RCE (CVE-2025-55182)"

🎯 Content Summary

Title: CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool


This repository contains a Python-based exploit framework for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC) affecting Next.js App Router deployments that use Server Actions and react-server-dom-webpack versions 19.0.0–19.2.0 (Next.js 15.x an...

🔧 Technical Details

Prototype pollution via RSC Flight protocol references
The technique relies on RSC’s Flight protocol treating strings starting with $ as object-reference paths. By assigning "then": "$1:__proto__:then" in a Flight payload, the deserializer writes a then property into Object.prototype through __proto__. This prototype pollution converts many otherwise benign objects into thenables, altering how asynchronous or promise-based framework code handles them and enabling attacker-controlled code paths.


Escalating a polluted reference into the Function constructor
The exploit generalizes a common prototype-chain trick: object.constructor usually yields Object, and Object.constructor is the global Function constructor. By placing a value like "$1:constructor:constructor" in a deserialized structure (e.g., assi...

🤖 Agent Actions

Summary:

  • Expanded src/network-services-pentesting/pentesting-web/nextjs.md with a new section covering CVE-2025-55182 React Server Components Flight protocol deserialization RCE, including the prototype-pollution-to-Function attack chain, payload structure, exploitation workflow, OPSEC options, and hardening guidance.
  • Added an internal reference to the NodeJS prototype pollution page plus an external reference to the exploit repository in the References section.

Testing:

  • Not required for documentation updates.

This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post: https://github.com/Spritualkb/CVE-2025-55182-exp

Content Categories: Based on the analysis, this content was categorized under "Pentesting Web -> NextJS (or, alternatively, Pentesting Web -> NodeJS Express / Prototype Pollution & Deserialization) with a subsection on "React Server Components Flight protocol deserialization RCE (CVE-2025-55182)"".

Repository Maintenance:

  • MD Files Formatting: 914 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants