{"id":160894,"date":"2025-12-05T03:30:40","date_gmt":"2025-12-05T01:30:40","guid":{"rendered":"https:\/\/jfrog.com\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/"},"modified":"2025-12-05T15:17:12","modified_gmt":"2025-12-05T13:17:12","slug":"2025-55182-and-2025-66478-react2shell-all-you-need-to-know","status":"publish","type":"post","link":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/","title":{"rendered":"CVE-2025-55182 und CVE-2025-66478 (\u201eReact2Shell\u201c) \u2013 Alles, was Sie wissen m\u00fcssen"},"content":{"rendered":"<p><img decoding=\"async\" class=\"aligncenter wp-image-160883 size-full\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032713\/CVE-Research_863x300.png\" alt=\"React2Shell CVE-2025-55182 vulnerability in React Server Components\" width=\"863\" height=\"300\" \/><\/p>\n<p><em>JFrog verfolgt die Entwicklungen rund um React2Shell weiterhin aktiv und stellt laufend Updates unter<a href=\"https:\/\/research.jfrog.com\"> research.jfrog.com<\/a> bereit.\u00a0<\/em><\/p>\n<hr \/>\n<h2>Was ist passiert?<\/h2>\n<p>Die Maintainer von <a href=\"https:\/\/react.dev\/blog\/2025\/12\/03\/critical-security-vulnerability-in-react-server-components\">React haben eine scherwiegende Sicherheitsl\u00fccke ver\u00f6ffentlicht <\/a>\u2013 <b>CVE-2025-55182<\/b> (bzw. die korrespondierende <b>CVE-2025-66478<\/b> in Next.js). Die Schwachstelle wurde vom <a href=\"https:\/\/react2shell.com\/\">urspr\u00fcnglichen Researcher<\/a> <strong>\u201eReact2Shell\u201c<\/strong> genannt, da sie die Ausf\u00fchrung beliebigen Codes durch (m\u00f6glicherweise nicht authentifizierte) entfernte Angreifer erm\u00f6glicht.<\/p>\n<p>Ein Angreifer kann remote eine speziell gestaltete HTTP-Anfrage an einen beliebigen <strong>React Server Function Endpoint<\/strong> senden, die \u2013 sobald sie von React deserialisiert wird \u2013 zur Ausf\u00fchrung beliebigen Codes auf dem Server f\u00fchrt. Die Erfolgsrate der Ausnutzung liegt Berichten zufolge bei Standardkonfigurationen bei nahezu <strong>100\u202f%.<\/strong><\/p>\n<p>Derzeit existieren <strong>keine<\/strong> echten Proof-of-Concept-Exploits f\u00fcr diese Schwachstellen. Einige PoCs wurden zwar auf GitHub ver\u00f6ffentlicht (besonders erw\u00e4hnenswert:<a href=\"https:\/\/github.com\/ejpir\/CVE-2025-55182-poc\/\"> dieser hier<\/a>), doch alle bisher bekannten Proof-of-Concepts haben sich als Fake herausgestellt.<br \/>\nWir raten Usern <strong>dringend davon ab, nicht-vertrauensw\u00fcrdigen PoC-Code auszuf\u00fchren<\/strong> \u2013 solche Projekte enthalten erfahrungsgem\u00e4\u00df h\u00e4ufig b\u00f6sartigen Code.<\/p>\n<h2>Wer ist von React2Shell betroffen?<\/h2>\n<h3>React-Server, die React Server Function Endpoints verwenden<\/h3>\n<p>Alle <strong>React-Server, die Server Function Endpoints nutzen<\/strong> sind nach aktuellem Wissenstand betroffen<\/p>\n<p>Ob eine React-Server-Anwendung diese anf\u00e4llige Funktionalit\u00e4t nutzt, l\u00e4sst sich \u00fcberpr\u00fcfen, indem man nach der Direktive <code>use server<\/code>; in beliebigen Quellcodedateien der Anwendung sucht. Diese Direktive weist darauf hin, dass eine <a href=\"https:\/\/react.dev\/reference\/rsc\/server-functions\">Server Function<\/a> definiert ist \u2013 und damit potenziell verwundbar.<\/p>\n<p><span style=\"font-weight: 400;\">Beispiel \u2013<\/span><\/p>\n<pre><code>async function requestUsername(formData) {\r\n  'use server';\r\n  const username = formData.get('username');\r\n  \/\/ ...\r\n}\r\n\r\nexport default function App() {\r\n  return (\r\n    &lt;form action={requestUsername}&gt;\r\n      &lt;input type=\"text\" name=\"username\" \/&gt;\r\n      &lt;button type=\"submit\"&gt;Request&lt;\/button&gt;\r\n    &lt;\/form&gt;\r\n  );\r\n}<\/code><\/pre>\n<h3>React-Server, die React Server Components unterst\u00fctzen<\/h3>\n<p>Laut der <a href=\"https:\/\/react.dev\/blog\/2025\/12\/03\/critical-security-vulnerability-in-react-server-components\">Stellungnahme des React-Teams <\/a>gilt: \u201eSelbst wenn Ihre Anwendung keine React Server Function Endpoints implementiert, kann sie dennoch verwundbar sein, wenn sie React Server Components unterst\u00fctzt.\u201c<\/p>\n<p>Welche konkreten Bedingungen eine Ausnutzung von CVE-2025-55182 erm\u00f6glichen, wenn React Server Components supported werden, ohne dass Server Function Endpoints verwendet werden, ist derzeit noch unklar.<\/p>\n<p>Wenn Ihre Anwendung in irgendeiner Weise React Server Components unterst\u00fctzt, sollten Sie dringend die betroffenen Komponenten auf eine der gepatchten Versionen aktualisieren (siehe Tabelle unten).<\/p>\n<h3>Next.js-Webanwendungen, die den App Router verwenden<\/h3>\n<p>Die wahrscheinlichste Angriffsfl\u00e4che besteht bei Next.js-Webanwendungen (CVE-2025-66478), da diese in der Standardkonfiguration verwundbar sind.<\/p>\n<p>Wenn Sie zum Beispiel eine neue Next.js-App mit dem Standardbefehl <code>create-next-app<\/code>\u00a0erstellen und dabei die empfohlenen Einstellungen \u00fcbernehmen, wird eine verwundbare Anwendung erzeugt, weil durch diese der Next.js <strong>App Router<\/strong> aktiviert wird, der wiederum den Zugriff auf die anf\u00e4lligen React Server Function Endpoints erlaubt.Solche Anwendungen enthalten ein app-Verzeichnis \u2013 ein klares Indiz daf\u00fcr, dass der anf\u00e4llige App Router verwendet wird.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/research.jfrog.com\/img\/RealTimePostImage\/react2shell\/AppRouterConfig.png\" data-click-attached=\"true\" \/><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/research.jfrog.com\/img\/RealTimePostImage\/react2shell\/AppRouterDir.png\" data-click-attached=\"true\" \/><\/p>\n<h3 id=\"vulnerable-packages--fixed-versions\">Verwundbare Pakete und gepatchte Versionen<\/h3>\n<table>\n<thead>\n<tr>\n<th align=\"left\">Vulnerable Components<\/th>\n<th align=\"left\">Vulnerable Versions<\/th>\n<th align=\"left\">Fixed Versions<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"left\">react-server-dom-webpack<\/td>\n<td align=\"left\">19.0.0<br \/>\n19.1.0 &#8211; 19.1.1<br \/>\n19.2.0<\/td>\n<td align=\"left\">19.0.1<br \/>\n19.1.2<br \/>\n19.2.1<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">react-server-dom-parcel<\/td>\n<td align=\"left\">19.0.0<br \/>\n19.1.0 &#8211; 19.1.1<br \/>\n19.2.0<\/td>\n<td align=\"left\">19.0.1<br \/>\n19.1.2<br \/>\n19.2.1<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">react-server-dom-turbopack<\/td>\n<td align=\"left\">19.0.0<br \/>\n19.1.0 &#8211; 19.1.1<br \/>\n19.2.0<\/td>\n<td align=\"left\">19.0.1<br \/>\n19.1.2<br \/>\n19.2.1<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Next.js<\/td>\n<td align=\"left\">15.0.0 &#8211; 15.0.4<br \/>\n15.1.0 &#8211; 15.1.8<br \/>\n15.2.0 &#8211; 15.2.5<br \/>\n15.3.0 &#8211; 15.3.5<br \/>\n15.4.0 &#8211; 15.4.7<br \/>\n15.5.0 &#8211; 15.5.6<br \/>\n16.0.0 &#8211; 16.0.6<\/td>\n<td align=\"left\">15.0.5<br \/>\n15.1.9<br \/>\n15.2.6<br \/>\n15.3.6<br \/>\n15.4.8<br \/>\n15.5.7<br \/>\n16.0.7<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Next.js<\/td>\n<td align=\"left\">14.3.0-canary.77 and later canary versions<\/td>\n<td align=\"left\">Downgrade to the latest stable 14.x release by running\u00a0<code>npm install next@14<\/code><\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Other Frameworks<\/td>\n<td align=\"left\">Any framework\/library bundling the vulnerable React RSC implementation (e.g., Vite RSC plugin, Parcel RSC plugin, React Router RSC preview, RedwoodSDK, Waku)<\/td>\n<td align=\"left\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Wie l\u00e4sst sich React2Shell entsch\u00e4rfen?<\/h2>\n<ul>\n<li aria-level=\"1\">Der <strong>einzige sichere Weg<\/strong>, die Schwachstellen CVE-2025-55182 und\u00a0 CVE-2025-66478 zu beheben, ist das Upgrade der betroffenen Pakete auf die in der Tabelle oben genannten Versionen oder eine neuere Version.<\/li>\n<\/ul>\n<p>Wenn ein sofortiges Upgrade nicht m\u00f6glich ist, k\u00f6nnen die folgenden Workarounds die Ausnutzbarkeit der Vulnerability verhindern &#8211;<\/p>\n<ul>\n<li><strong>F\u00fcr Next.js-Apps:<\/strong> Falls App Router nicht stark genutzt wird, kann die Webanwendung auf den Pages Router zur\u00fcck migriert werden. Die Umstellung erkl\u00e4rt der <a href=\"https:\/\/nextjs.org\/docs\/app\/guides\/migrating\/app-router-migration\">Next.js App Router Migration Guide\u00a0<\/a>.<\/li>\n<\/ul>\n<h2 id=\"how-can-i-track-react2shell\">Wie kann ich React2Shell tracken?<\/h2>\n<ul>\n<li><span style=\"font-weight: 400;\">\u00dcber die JFrog Plattform<\/span>\n<ul>\n<li aria-level=\"2\">Die Vulnerabilities werden in Xray unter <strong>XRAY-900398<\/strong> &amp; <strong>XRAY-900476 <\/strong>gef\u00fchrt.<\/li>\n<li><span style=\"font-weight: 400;\">Der Xray\u00a0 Katalog erkennt automatisch alle verwundbaren React- und Next.js-Pakete in Ihrer Codebasis und liefert priorisierte Patch-Empfehlungen basierend auf verf\u00fcgbarerVersionierung.<\/span><img decoding=\"async\" src=\"https:\/\/research.jfrog.com\/img\/RealTimePostImage\/react2shell\/Catalog1.png\" data-click-attached=\"true\" \/><\/li>\n<li>JFrog Advanced Security Nutzer finden Ergebnisse der Kontext Analyse f\u00fcr\u00a0 CVE-2025-55182 &amp; CVE-2025-66478 &#8211;<br \/>\n<img decoding=\"async\" src=\"https:\/\/research.jfrog.com\/img\/RealTimePostImage\/react2shell\/Contextual1.png\" data-click-attached=\"true\" \/><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-weight: 400;\">Bei Verwendung eines Open-Source-Detektors \u2013 <\/span><a href=\"https:\/\/github.com\/assetnote\/react2shell-scanner\"><span style=\"font-weight: 400;\">https:\/\/github.com\/assetnote\/react2shell-scanner <\/span><\/a>&#8220;<span style=\"font-weight: 400;\">Der Scanner sendet eine speziell gestaltete multipart-POST-Anfrage, die in verwundbaren Versionen der React Server Components eine bestimmte Fehlersituation ausl\u00f6st. Verwundbare Hosts antworten mit einem HTTP-Statuscode 500 und enthalten <\/span><span style=\"font-weight: 400;\">E{&#8220;digest&#8221;<\/span><span style=\"font-weight: 400;\"> im Response-Body. Dieser Check unterscheidet verwundbare Hosts von solchen, die lediglich React Server Components verwenden.&#8221;<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>JFrog verfolgt die Entwicklungen rund um React2Shell weiterhin aktiv und stellt laufend Updates unter research.jfrog.com bereit.\u00a0 Was ist passiert? Die Maintainer von React haben eine scherwiegende Sicherheitsl\u00fccke ver\u00f6ffentlicht \u2013 CVE-2025-55182 (bzw. die korrespondierende CVE-2025-66478 in Next.js). Die Schwachstelle wurde vom urspr\u00fcnglichen Researcher \u201eReact2Shell\u201c genannt, da sie die Ausf\u00fchrung beliebigen Codes durch (m\u00f6glicherweise nicht authentifizierte) entfernte &hellip;<\/p>\n","protected":false},"author":506,"featured_media":160887,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[10157],"tags":[10988,10348],"class_list":["post-160894","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sicherheit-und-devsecops","tag-react2shell-de","tag-security-research-de","resource_categories-security-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>React2Shell (CVE-2025-55182) Schwachstelle in React &amp; Next.js | JFrog<\/title>\n<meta name=\"description\" content=\"React2Shell (CVE-2025-55182): Kritische Schwachstelle in React &amp; Next.js. Wie Sie herausfinden, ob Sie betroffen sind &amp; die L\u00fccke schlie\u00dfen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/160894\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2025-55182 und CVE-2025-66478 (\u201eReact2Shell\u201c) \u2013 Alles, was Sie wissen m\u00fcssen\" \/>\n<meta property=\"og:description\" content=\"React2Shell (CVE-2025-55182): Kritische Schwachstelle in React &amp; Next.js. Wie Sie herausfinden, ob Sie betroffen sind &amp; die L\u00fccke schlie\u00dfen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-05T01:30:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-05T13:17:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032951\/CVE-Research_1200x628.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"zoer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jfrog\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zoer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/\"},\"author\":{\"name\":\"zoer\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e\"},\"headline\":\"CVE-2025-55182 und CVE-2025-66478 (\u201eReact2Shell\u201c) \u2013 Alles, was Sie wissen m\u00fcssen\",\"datePublished\":\"2025-12-05T01:30:40+00:00\",\"dateModified\":\"2025-12-05T13:17:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/\"},\"wordCount\":693,\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032834\/CVE-Research_Thumbnail.png\",\"keywords\":[\"React2Shell\",\"security-research\"],\"articleSection\":[\"Sicherheit und DevSecOps\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/\",\"url\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/\",\"name\":\"React2Shell (CVE-2025-55182) Schwachstelle in React & Next.js | JFrog\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032834\/CVE-Research_Thumbnail.png\",\"datePublished\":\"2025-12-05T01:30:40+00:00\",\"dateModified\":\"2025-12-05T13:17:12+00:00\",\"description\":\"React2Shell (CVE-2025-55182): Kritische Schwachstelle in React & Next.js. Wie Sie herausfinden, ob Sie betroffen sind & die L\u00fccke schlie\u00dfen!\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032834\/CVE-Research_Thumbnail.png\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032834\/CVE-Research_Thumbnail.png\",\"width\":203,\"height\":148,\"caption\":\"React2Shell CVE Blog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2025-55182 und CVE-2025-66478 (\u201eReact2Shell\u201c) \u2013 Alles, was Sie wissen m\u00fcssen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/de\/#website\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/de\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e\",\"name\":\"zoer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g\",\"caption\":\"zoer\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"React2Shell (CVE-2025-55182) Schwachstelle in React & Next.js | JFrog","description":"React2Shell (CVE-2025-55182): Kritische Schwachstelle in React & Next.js. Wie Sie herausfinden, ob Sie betroffen sind & die L\u00fccke schlie\u00dfen!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/160894","og_locale":"de_DE","og_type":"article","og_title":"CVE-2025-55182 und CVE-2025-66478 (\u201eReact2Shell\u201c) \u2013 Alles, was Sie wissen m\u00fcssen","og_description":"React2Shell (CVE-2025-55182): Kritische Schwachstelle in React & Next.js. Wie Sie herausfinden, ob Sie betroffen sind & die L\u00fccke schlie\u00dfen!","og_url":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_published_time":"2025-12-05T01:30:40+00:00","article_modified_time":"2025-12-05T13:17:12+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032951\/CVE-Research_1200x628.png","type":"image\/png"}],"author":"zoer","twitter_card":"summary_large_image","twitter_creator":"@jfrog","twitter_site":"@jfrog","twitter_misc":{"Written by":"zoer","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/"},"author":{"name":"zoer","@id":"https:\/\/jfrog.com\/de\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e"},"headline":"CVE-2025-55182 und CVE-2025-66478 (\u201eReact2Shell\u201c) \u2013 Alles, was Sie wissen m\u00fcssen","datePublished":"2025-12-05T01:30:40+00:00","dateModified":"2025-12-05T13:17:12+00:00","mainEntityOfPage":{"@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/"},"wordCount":693,"publisher":{"@id":"https:\/\/jfrog.com\/de\/#organization"},"image":{"@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032834\/CVE-Research_Thumbnail.png","keywords":["React2Shell","security-research"],"articleSection":["Sicherheit und DevSecOps"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/","url":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/","name":"React2Shell (CVE-2025-55182) Schwachstelle in React & Next.js | JFrog","isPartOf":{"@id":"https:\/\/jfrog.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032834\/CVE-Research_Thumbnail.png","datePublished":"2025-12-05T01:30:40+00:00","dateModified":"2025-12-05T13:17:12+00:00","description":"React2Shell (CVE-2025-55182): Kritische Schwachstelle in React & Next.js. Wie Sie herausfinden, ob Sie betroffen sind & die L\u00fccke schlie\u00dfen!","breadcrumb":{"@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#primaryimage","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032834\/CVE-Research_Thumbnail.png","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/12\/05032834\/CVE-Research_Thumbnail.png","width":203,"height":148,"caption":"React2Shell CVE Blog"},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/de\/blog\/2025-55182-and-2025-66478-react2shell-all-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/de\/"},{"@type":"ListItem","position":2,"name":"CVE-2025-55182 und CVE-2025-66478 (\u201eReact2Shell\u201c) \u2013 Alles, was Sie wissen m\u00fcssen"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/de\/#website","url":"https:\/\/jfrog.com\/de\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/de\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/jfrog.com\/de\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e","name":"zoer","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g","caption":"zoer"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/160894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/users\/506"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/comments?post=160894"}],"version-history":[{"count":4,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/160894\/revisions"}],"predecessor-version":[{"id":160898,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/160894\/revisions\/160898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/media\/160887"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/media?parent=160894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/categories?post=160894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/tags?post=160894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}