Current Version: Next.js 16.1.0 β React Version: 18.3.1 Vulnerability: CVE-2025-55182 (React2Shell) - PATCHED Severity: CRITICAL - Remote Code Execution (Now Mitigated) Upgrade Date: December 19, 2025
- Added
X-React2Shell-Protectionheader - Strict Content-Security-Policy
- XSS and clickjacking protection
- Blocking suspicious RSC-related paths (
__rsc,server-components, etc.) - Content-Type validation for POST requests
- Request logging for suspicious activity
- Disabled server actions in production
- Enhanced webpack configuration for security
Upgrade Summary:
- β Next.js: 15.0.3 β 16.1.0
- β React: 18.3.1 (already patched)
- β React DOM: 18.3.1 (already patched)
Changes Made:
- Updated
images.domainsβimages.remotePatterns(Next.js 16 requirement) - Fixed webpack configuration for Turbopack compatibility
- Maintained all security headers and protections
- Updated TypeScript configuration
Verification:
# Verify installed versions
npm list next react react-dom --depth=0
# Test build
npm run buildIf your application was online after December 4, 2025, 1:00 PM PT:
- Database credentials - Rotate immediately
- API keys - Regenerate all keys
- Authentication secrets - Update Clerk and other auth providers
- Environment variables - Change all sensitive values
- β Security Headers: Active in next.config.ts
- β Middleware Protection: Active in middleware.ts
- β Webpack Security: Node.js module isolation
β οΈ Vercel WAF: Enable in Vercel dashboard
If your application was online after December 4, 2025, 1:00 PM PT:
- Database credentials - Rotate immediately
- API keys - Regenerate all keys
- Authentication secrets - Update Clerk and other auth providers
- Environment variables - Change all sensitive values
- Turn on Standard Protection for all deployments
- Audit all shareable links
- Enable Vercel WAF rules
β FULLY PATCHED - React2Shell Mitigated
| Protection Layer | Status | Notes |
|---|---|---|
| Next.js Version | β 16.1.0 (PATCHED) | React2Shell vulnerability fixed |
| Server Actions | β Disabled in production | Prevents main exploit vector |
| Security Headers | β Active | Blocks known attack patterns |
| Middleware | β Active | Filters suspicious requests |
| Webpack Config | β Active | Prevents dangerous bundling |
| Database Security | β Active | Server-side enforcement |
| React Version | β 18.3.1 (Safe) | No known vulnerabilities |
-
Requests to paths containing:
__rscserver-componentsreact-serverrsc-payload
-
Unusual POST requests with non-JSON content types
-
Multiple failed requests to API endpoints
Check your logs for:
Blocked suspicious RSC request:
- December 4, 2025: Vulnerability publicly disclosed
- December 5, 2025: Vercel released automated patching tool
- December 6, 2025: Secret rotation recommended for exposed apps
- December 8, 2025: Vercel Agent automated upgrades available
For security incidents, contact:
- Vercel Security: security@vercel.com
- React Security: security@reactjs.org
DO NOT discuss vulnerability details in public channels.