Are MCPs Affected?
Most MCPs are not affected. Here’s why: The React2Shell vulnerability targets React Server Components (RSC) — a frontend technology. Traditional MCP servers are backend services that expose tools, resources, and prompts over the MCP protocol. They don’t run React, don’t use RSC, and don’t have the vulnerable packages installed. If your MCP is a standard tool server built with LeanMCP, the official MCP SDK, or any backend-only framework — you’re safe. No action required.When MCPs Are Affected
MCPs become vulnerable when they include a frontend component that uses React Server Components. This specifically applies to:- MCP-UI implementations — if you’re rendering interactive UI components using Next.js App Router
- MCP Apps — the new extension for interactive user interfaces in MCP, especially if built with Next.js
- ChatGPT Apps built with Next.js — as described in the Vercel blog on running Next.js inside ChatGPT
Affected Packages
The vulnerability exists in these React packages:react-server-dom-webpackreact-server-dom-parcelreact-server-dom-turbopack
- Next.js (15.x, 16.x, 14.3.0-canary.77+)
- React Router (unstable RSC APIs)
- Waku
- Expo (RSC features)
- @vitejs/plugin-rsc
How to Check If You’re Vulnerable
Run an audit on your project:How to Patch
Next.js
Upgrade to the patched version for your release line:React Router (unstable RSC APIs)
Other Frameworks
After Patching
Rotate any environment variables or secrets that may have been exposed if you were running a vulnerable version in production.Summary
| MCP Type | Affected? | Action Required |
|---|---|---|
| Standard tool servers (LeanMCP, MCP SDK) | No | None |
| Backend-only MCPs | No | None |
| MCP-UI with Next.js App Router | Yes | Patch immediately |
| MCP Apps with Next.js | Yes | Patch immediately |
| ChatGPT Apps with Next.js | Yes | Patch immediately |
References
- CVE-2025-55182 (React)
- CVE-2025-66478 (Next.js)
- React Security Advisory
- Vercel: Running Next.js inside ChatGPT
MCP Apps Guide
Building interactive UIs
LeanMCP Security
Authentication best practices