By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
Computing

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

News Room
Last updated: 2025/12/12 at 4:18 AM
News Room Published 12 December 2025
Share
React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
SHARE

Dec 12, 2025Ravie LakshmananVulnerability / Threat Intelligence

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation.

The critical vulnerability, tracked as CVE-2025-55182 (CVSS score: 10.0), affects the React Server Components (RSC) Flight protocol. The underlying cause of the issue is an unsafe deserialization that allows an attacker to inject malicious logic that the server executes in a privileged context. It also affects other frameworks, including Next.js, Waku, Vite, React Router, and RedwoodSDK.

“A single, specially crafted HTTP request is sufficient; there is no authentication requirement, user interaction, or elevated permissions involved,” Cloudforce One, Cloudflare’s threat intelligence team, said. “Once successful, the attacker can execute arbitrary, privileged JavaScript on the affected server.”

Since its public disclosure on December 3, 2025, the shortcoming has been exploited by multiple threat actors in various campaigns to engage in reconnaissance efforts and deliver a wide range of malware families.

Cybersecurity

The development prompted CISA to add it to its Known Exploited Vulnerabilities catalog last Friday, giving federal agencies until December 26 to apply the fixes. The deadline has since been revised to December 12, 2025, an indication of the severity of the incident.

Cloud security company Wiz said it has observed a “rapid wave of opportunistic exploitation” of the flaw, with a vast majority of the attacks targeting internet-facing Next.js applications and other containerized workloads running in Kubernetes and managed cloud services.

Image Source: Cloudflare

Cloudflare, which is also tracking ongoing exploitation activity, said threat actors have conducted searches using internet-wide scanning and asset discovery platforms to find exposed systems running React and Next.js applications. Notably, some of the reconnaissance efforts have excluded Chinese IP address spaces from their searches.

“Their highest-density probing occurred against networks in Taiwan, Xinjiang Uyghur, Vietnam, Japan, and New Zealand – regions frequently associated with geopolitical intelligence collection priorities,” the web infrastructure company said.

The observed activity is also said to have targeted, albeit more selectively, government (.gov) websites, academic research institutions, and critical‑infrastructure operators. This included a national authority responsible for the import and export of uranium, rare metals, and nuclear fuel.

Some of the other notable findings are listed below –

  • Prioritizing high‑sensitivity technology targets such as enterprise password managers and secure‑vault services, likely with the goal of perpetrating supply chain attacks
  • Targeting edge‑facing SSL VPN appliances whose administrative interfaces may incorporate React-based components
  • Early scanning and exploitation attempts originated from IP addresses previously associated with Asia-affiliated threat clusters

In its own analysis of honeypot data, Kaspersky said it recorded over 35,000 exploitation attempts on a single day on December 10, 2025, with the attackers first probing the system by running commands like whoami, before dropping cryptocurrency miners or botnet malware families like Mirai/Gafgyt variants and RondoDox.

Security researcher Rakesh Krishnan has also discovered an open directory hosted on “154.61.77[.]105:8082” that includes a proof-of-concept (PoC) exploit script for CVE-2025–55182 along with two other files –

  • “domains.txt,” which contains a list of 35,423 domains
  • “next_target.txt,” which contains a list of 596 URLs, including companies like Dia Browser, Starbucks, Porsche, and Lululemon
Cybersecurity

It has been assessed that the unidentified threat actor is actively scanning the internet based on targets added to the second file, infecting hundreds of pages in the process.

According to the latest data from The Shadowserver Foundation, there are more than 137,200 internet-exposed IP addresses running vulnerable code as of December 11, 2025. Of these, over 88,900 instances are located in the U.S., followed by Germany (10,900), France (5,500), and India (3,600).

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Stanford’s star reporter takes on Silicon Valley’s ‘money-soaked’ startup culture |  News Stanford’s star reporter takes on Silicon Valley’s ‘money-soaked’ startup culture | News
Next Article Control Resonant Expands the Remedyverse With New Setting and New Threats Control Resonant Expands the Remedyverse With New Setting and New Threats
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

AI inference startup Runware raises M to make AI run faster –  News
AI inference startup Runware raises $50M to make AI run faster – News
News
Why Microsoft Discontinued WordPad After 30 Years – BGR
Why Microsoft Discontinued WordPad After 30 Years – BGR
News
JLab JBuds Party Review
JLab JBuds Party Review
Gadget
Linux Patches Fix eMMC Secure Erase Of 1GB Taking ~10 Minutes To Now Just 2 Seconds
Linux Patches Fix eMMC Secure Erase Of 1GB Taking ~10 Minutes To Now Just 2 Seconds
Computing

You Might also Like

Linux Patches Fix eMMC Secure Erase Of 1GB Taking ~10 Minutes To Now Just 2 Seconds
Computing

Linux Patches Fix eMMC Secure Erase Of 1GB Taking ~10 Minutes To Now Just 2 Seconds

2 Min Read
Chinese GPU firm MetaX plans to lay off 200 employees ahead of IPO launch · TechNode
Computing

Chinese GPU firm MetaX plans to lay off 200 employees ahead of IPO launch · TechNode

1 Min Read
How WrappedCBDC’s cNGN stablecoin works
Computing

How WrappedCBDC’s cNGN stablecoin works

17 Min Read
How to create a TikTok marketing strategy for your business
Computing

How to create a TikTok marketing strategy for your business

12 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?