Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)

Posted on December 4, 2025December 4, 2025 By CWS

A brand new safety evaluation software has been launched to assist researchers and directors determine React Server Elements (RSC) endpoints doubtlessly uncovered to CVE-2025-55182.

Developed as a light-weight by Pentester with the alias Fatguru, a non-intrusive Python script, the scanner affords a technique for “Floor Detection” that avoids the pitfalls of aggressive proof-of-concept (PoC) exploits, which continuously fail in manufacturing environments as a result of code minification and tree-shaking.

CVE-2025-55182 is a essential vulnerability within the Subsequent.js framework, particularly affecting how Server Actions deal with serialized knowledge. Whereas the vulnerability can result in Distant Code Execution (RCE), verifying its presence has confirmed troublesome for safety groups.

Many current PoCs try and inject inflexible payloads, comparable to vm#runInThisContext, or depend on default module IDs like {“id”:”vm”}.

In growth environments, these payloads typically set off efficiently. Nevertheless, in manufacturing builds utilizing Webpack or Turbopack, module IDs are usually minified into integers (e.g., 742) or quick strings.

Consequently, commonplace RCE makes an attempt fail in opposition to susceptible servers as a result of the exploit payload references module names that now not exist within the compiled code, resulting in a harmful false sense of safety.

The newly launched scanner addresses this detection hole by validating the assault floor reasonably than making an attempt to fireplace a selected exploit gadget.

As a substitute of sending a malicious payload, the software checks if the goal server exposes the RSC protocol indicated by the Content material-Sort: textual content/x-component header and accepts particular Subsequent.js motion headers. If the server makes an attempt to course of these RSC payloads, the software flags the endpoint as uncovered.

This strategy confirms that the vulnerability pathway is open with no need to guess the proper minified module ID or disrupt the server operations.

For safety professionals, a optimistic outcome from this scanner signifies that the endpoint is reachable and processing doubtlessly harmful enter.

The software’s documentation notes that if the scanner flags a goal, additional handbook validation is required to show RCE. This may contain enumerating or fuzzing the Webpack Module ID (typically integers between 1 and 5000 in manufacturing) or analyzing client-side belongings like webpack-runtime.js to map legitimate IDs to potential devices.

The software is designed for ease of use and integration into current workflows. It helps single-target scanning through command line arguments in addition to bulk scanning by means of record enter, outputting outcomes to a CSV file for reporting. Stipulations for operating the software are minimal, requiring solely Python 3 and commonplace library dependencies.

This launch supplies a vital functionality for organizations operating Subsequent.js purposes, permitting them to audit their publicity to CVE-2025-55182 successfully earlier than attackers can reverse-engineer manufacturing builds to craft working exploits.

Remediation Steps:

Improve Instantly: Replace to the newest patched variations (e.g., Subsequent.js 15.0.5+, 15.1.9+, or 16.0.7+).​

Confirm Publicity: Use the scanner to audit your exterior assault floor and ensure that no unpatched endpoints stay accessible.

Obtain the Software: Safety groups can entry the scanner and full documentation on the official repository under.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:CVE202555182, Detecting, Endpoints, Exposed, Next.js, ReactJS, RSC, Scanner, Tool

Post navigation

Previous Post: New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
Next Post: Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Related Posts

Threat Actor Mimo Attacking Magento CMS to Steal Card Details and Bandwidth Monetization Cyber Security News
Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers Cyber Security News
Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account Cyber Security News
North Korean Hackers Attacking Developers with 338 Malicious npm Packages Cyber Security News
Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware Cyber Security News
Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark