đ Quick Safety PSA for Anyone With a Public Website/App (Next.js / React)
If you have any public web app (especially something âvibe-codedâ and deployed fast), thereâs a critical security issue affecting some apps built with Next.js + React Server Components (App Router). In plain English: in unpatched setups, an attacker may be able to take control of your server without logging in, and potentially access things like API keys, database credentials, and environment variables. Who should care? â
You should care if: - Your app uses Next.js App Router / React Server Components (common in modern Next.js projects). - Your app was online and not patched in early December 2025 (active scanning/exploitation has been reported). â Youâre likely not affected if: - Youâre on Next.js 13, Next.js 14 stable, or using the Pages Router (older routing style). â
What to do (no jargon, 5â15 minutes) If youâre NOT technical (but you own/operate the app) 1. Message whoever built your site/app today:âPlease check if we use Next.js App Router / React Server Components and patch the React2Shell vulnerability.â 2. After patching, ask them to rotate secrets (API keys, DB passwords). Next.js explicitly recommends this if you were online and unpatched around Dec 4, 2025. If you ARE technical (or you have your repo) - Follow the official Next.js advisory and upgrade to a patched version + redeploy. - Easiest path: run the official fixer tool:npx fix-react2shell-next - Then rotate secrets after redeploying (important). Extra layer (nice to have, not a substitute for patching) Some platforms/WAFs have deployed protections (e.g., Cloudflare), but the real fix is still upgrade + redeploy. Shipping fast is awesome. Shipping safe is the real advantage â