On December 3, 2025, Meta disclosed CVE-2025-55182 — a critical unauthenticated remote code execution vulnerability in React Server Components, commonly known as React2Shell. It’s rated CVSS 10.0, the highest severity possible. An attacker can craft malicious HTTP requests to any Server Function endpoint that, when deserialized by React, achieves remote code execution on the server. Within hours of disclosure, China-nexus threat groups including Earth Lamia and Jackpot Panda were actively exploiting this vulnerability in the wild. CISA added it to their Known Exploited Vulnerabilities list on December 5, 2025.Documentation Index
Fetch the complete documentation index at: https://docs.leanmcp.com/llms.txt
Use this file to discover all available pages before exploring further.
Are MCPs Affected?
Most MCPs are not affected. Here’s why: The React2Shell vulnerability targets React Server Components (RSC) — a frontend technology. Traditional MCP servers are backend services that expose tools, resources, and prompts over the MCP protocol. They don’t run React, don’t use RSC, and don’t have the vulnerable packages installed. If your MCP is a standard tool server built with LeanMCP, the official MCP SDK, or any backend-only framework — you’re safe. No action required.When MCPs Are Affected
MCPs become vulnerable when they include a frontend component that uses React Server Components. This specifically applies to:- MCP-UI implementations — if you’re rendering interactive UI components using Next.js App Router
- MCP Apps — the new extension for interactive user interfaces in MCP, especially if built with Next.js
- ChatGPT Apps built with Next.js — as described in the Vercel blog on running Next.js inside ChatGPT
Affected Packages
The vulnerability exists in these React packages:react-server-dom-webpackreact-server-dom-parcelreact-server-dom-turbopack
- Next.js (15.x, 16.x, 14.3.0-canary.77+)
- React Router (unstable RSC APIs)
- Waku
- Expo (RSC features)
- @vitejs/plugin-rsc
How to Check If You’re Vulnerable
Run an audit on your project:How to Patch
Next.js
Upgrade to the patched version for your release line:React Router (unstable RSC APIs)
Other Frameworks
After Patching
Rotate any environment variables or secrets that may have been exposed if you were running a vulnerable version in production.Summary
| MCP Type | Affected? | Action Required |
|---|---|---|
| Standard tool servers (LeanMCP, MCP SDK) | No | None |
| Backend-only MCPs | No | None |
| MCP-UI with Next.js App Router | Yes | Patch immediately |
| MCP Apps with Next.js | Yes | Patch immediately |
| ChatGPT Apps with Next.js | Yes | Patch immediately |
References
- CVE-2025-55182 (React)
- CVE-2025-66478 (Next.js)
- React Security Advisory
- Vercel: Running Next.js inside ChatGPT
MCP Apps Guide
Building interactive UIs
LeanMCP Security
Authentication best practices

