Last week, the web development world was shaken by the disclosure of CVE-2025-55182 and CVE-2025-66478, two critical zero-day vulnerabilities in React and Next.js. Rated 10.0 on the CVSS scale, these flaws represent the highest level of severity because they enable one of the most dangerous attack vectors: Remote Code Execution (RCE), allowing attackers to run arbitrary code on vulnerable servers.

React and Next.js are the backbone of countless modern web applications, from e-commerce platforms to SaaS products. A successful exploit could mean data breaches, service outages, and reputational damage on a massive scale.

 

What Is ReactToShell and Why Is It So Dangerous?

This vulnerability targets React Server Components (RSC) and Next.js rendering logic. Attackers can craft malicious payloads that manipulate server-side rendering, tricking the application into executing arbitrary JavaScript on the server. In simple terms: if exploited, attackers could gain full control of your application environment.

The exploit is stealthy and, in certain configurations, requires no authentication, making it a prime candidate for automated attacks. The official advisory from Next.js provides technical details: 

 

Industry Response: Patch Quickly

Security teams worldwide are racing to patch affected versions. But here’s the truth: patching alone isn’t enough. Zero-day vulnerabilities highlight a fundamental reality that reactive security is no longer sufficient. Organizations need proactive defenses that stop unknown threats before they become headlines.

 

Our Immediate Actions

At Mastercard Threat Protection (powered by Baffin Bay), we took a two-pronged approach:

  1. Patched All Impacted Services
    We applied vendor-recommended patches across all internal and customer-facing services using React or Next.js.

  2. Verified Our Protection Against Real Exploits
    We didn’t just rely on theory. Our SOC and Product Development teams conducted rigorous testing using multiple Proof-of-Concept (PoC) exploits, including the official exploit published by the vulnerability author (React2Shell PoC).

 

How We Tested: Real-World Scenarios

  • Scenario 1: Without Threat Protection’s Web Application Security Service
    Exploits executed successfully, confirming the severity of the vulnerability.

  • Scenario 2: With Mastercard Threat Protection Enabled
     All exploit attempts were blocked out-of-the-box when our Web Application Firewall (WAF) was enabled in blocking mode. We tested even with our previous WAF Rules Group version, which has been available for several months, and the exploits were mitigated successfully. 

Key Finding:
No custom rules were needed. Our WAF mitigated the attack vector proactively, validating the strength of our default configuration.

 

Why Our Customers Were Already Safe

Customers using our Layer 7 Web Application Security Service (“HTTP Proxy”) with the WAF updated and enabled in blocking mode have been protected against ReactToShell long before it was publicly disclosed. We encourage our customers to continuously update to the latest WAF Rule Group version for maximum protection against this and other recent vulnerabilities. This upgrade is simple, free of charge, and available through our Threat Protection portal.

 

Why Proactive Security Matters

Zero-day vulnerabilities are unpredictable. Waiting for patches or relying on reactive measures leaves organizations exposed. Our intelligence-driven Threat Protection platform doesn’t just react, it proactively defends against:

  • Zero-day vulnerabilities
  • DDoS and application-layer attacks
  • Known bad actors via IP Threat Intelligence

This proactive approach is why our customers remained secure even before ReactToShell was disclosed.

 

What Should You Do Now?

  1. Patch your React and Next.js applications immediately.
  2. Request a demo to see how Mastercard Threat Protection can safeguard your business against zero-day vulnerabilities and beyond.
  3. Enable our Layer 7 Web Application Security Service with WAF in blocking mode and upgrade to the latest Rule Set for comprehensive protection.
    Additional features include:
    • IP Reputation (blocks known bad actors)
    • DDoS Protection
    • Bot Protection
    • IP Access Control

Don’t wait for the headlines to upgrade your security. Be proactive and act today. 

Request a Demo