Security Update: React2Shell

This announcement is only relevant to self-hosted Kinpal installations. If you use Kinpal's hosted service at kinpal.com, you do not need to take any action. Our servers were patched within hours of the CVEs being announced, and there was no breach of our servers during that time.


A critical security vulnerability has been discovered in React Server Components that affects Kinpal. On unpatched installations, this vulnerability could allow an attacker to execute code remotely on your server. If your instance is accessible from the internet and you are not running the latest release, your server is at significant risk.

This vulnerability, CVE-2025-55182 (also known as React2Shell), affects many applications built with React 19. There have already been reports of real-world breaches where attackers deployed malicious software on compromised servers.

Additionally, two additional vulnerabilities (CVE-2025-55183, CVE-2025-55184) have been identified in the React Server Components (RSC) protocol. While these do not allow for Remote Code Execution, they still require patching.

The React team later discovered that the fix for CVE-2025-55184 was incomplete, requiring an additional patch. This has been disclosed as CVE-2025-67779.

Timeline

  • December 3, 2025: React2Shell (CVE-2025-55182) was announced by the React team
  • December 4, 2025: We published v4.5.7 (updated Next.js package)
  • December 8, 2025: We published v4.5.8 (updated React package, fully protected against React2Shell)
  • December 11, 2025: Two additional CVEs (CVE-2025-55183, CVE-2025-55184) were announced by the React team. We published v4.5.10 in response
  • December 12, 2025: The React team announced that the fix for CVE-2025-55184 was incomplete. The additional fix is disclosed as CVE-2025-67779. We published v4.5.11 in response

Action Required

If you are self-hosting Kinpal, please take the following steps immediately:

If you are self-hosting Kinpal, please take the following steps immediately:

  • Update Kinpal to the latest version (v4.5.11 or later) to be protected against all four CVEs. See the release notes for details.
  • If you are on v4.5.10, you must update to v4.5.11 as the previous fix was incomplete.
  • If you are on v4.5.8 (which fully protected against React2Shell), you must update to v4.5.11 to be protected against all vulnerabilities.
  • If you are on v4.5.7, you should update to v4.5.11 as v4.5.7 may not have fully protected against React2Shell.
  • If you are on a version prior to v4.5.7, you are vulnerable to React2Shell and should update immediately.
  • Restart all services and, if using Docker, rebuild/pull the latest image.
  • If you cannot update right away, temporarily restrict access (VPN/auth proxy) until patched.

After updating, verify your instance reports the latest Kinpal version and review logs for any warnings. To check the version, visit: <your‑rallly‑instance>/api/status.

Additional Information

For full technical details about all four vulnerabilities:

Kinpal
Kinpal