A modified and boosted exploit for CVE-2025-55182 a pre-authentication Remote Code Execution in React Server version 19.0, 19.1.0, 19.1.1, and 19.2.0
The vulnerability spans the following:
- react-server-dom-webpack
- react-server-dom-parcel
- react-server-dom-turbopack
Using the chunk references to retrieve prototype properties is fixed with this check:
@@ -78,7 +80,10 @@ export function preloadModule<T>(
export function requireModule<T>(metadata: ClientReference<T>): T {
const moduleExports = parcelRequire(metadata[ID]);
- return moduleExports[metadata[NAME]];
+ if (hasOwnProperty.call(moduleExports, metadata[NAME])) {
+ return moduleExports[metadata[NAME]];
+ }
+ return (undefined: any);
}Author: msanft - https://github.com/msanft/CVE-2025-55182
Date: 05/12/2025 - DD/MM/YY
Editor: MikeTheHash
Edit Date: 07/12/2025 - DD/MM/YY
Use it at your own risk. I assume no liability for any misuse, damage, or legal consequences resulting from its use