Guides | 002: React2Shell what it is, and what Vercel + patching mean for your site

Date Published

In late 2025, security researchers and vendors disclosed a critical issue in React Server Components widely referred to as “React2Shell,” tracked as CVE-2025-55182. In short, certain vulnerable combinations of React 19 and Next.js allowed crafted network requests against Server Function endpoints to deserialise attacker‑controlled data in an unsafe way, in the worst case leading to remote code execution on the application server before any user login.

The official fix is not a marketing setting; it is version hygiene. The React and Next.js teams published patched releases (for example patched Next.js 15.x and 16.x lines and corresponding React server packages; see the current Vercel changelog and React security advisory for the exact matrix, which may evolve). If your app stayed on a vulnerable build, no CDN toggle replaces upgrading.

Where Vercel comes in: as a platform they ship additional layers, documented WAF rules, deployment protection for preview URLs, and tooling such as automated fix scripts for Next.js projects, but their own guidance still centres on upgrading dependencies and, if you were exposed during the disclosure window, rotating secrets. Think of Vercel as shortening the gap between “patch exists” and “your project runs it,” not as a substitute for maintenance.

What Thunderwerx does in practice: our customer sites on Vercel track supported Next.js releases as part of normal service, we apply security updates when advisories land, and we treat high‑severity framework CVEs as all‑hands until every production deployment is on a fixed version or documented exception. We do not claim magical immunity. We claim disciplined patching on a managed stack.

If you self‑host or subcontract elsewhere, use this post as a checklist: confirm your Next.js and react-server-dom* versions against the vendor matrix, run your package manager upgrade, redeploy, and verify build logs. If you were on a vulnerable release while internet‑reachable, follow rotation guidance for API keys and database credentials even if you see no intrusion signs. That is standard incident hygiene, not panic.

Further reading: Vercel’s CVE-2025-55182 changelog entry and React2Shell resource post; the React and Next.js GitHub security advisories. When in doubt, ask your developer for a one‑line `package.json` diff showing the patched versions. That is the ground truth.

Guides | 002: React2Shell & Vercel | Thunderwerx LTD