Critical Threat Alert: React2Shell Exploits Flood the Internet as Attacks Continue


The cybersecurity landscape is currently grappling with a massive wave of exploitation targeting a critical vulnerability in React Server Components (RSC), commonly dubbed React2Shell (Trend Micro, Dark Reading). Tracked as CVE-2025-55182, this flaw has been assigned the maximum severity score of CVSS 10.0, triggering urgent calls for immediate patching across the industry (Wiz, Rapid7).

The exploit leverages a flaw in the core mechanism of modern web development and is being rapidly weaponized by a diverse range of threat actors—from state-linked groups to opportunistic botnet operators. 

The Heart of the Vulnerability: Unsafe Deserialization

The React2Shell vulnerability is an unauthenticated Remote Code Execution (RCE) flaw rooted in an unsafe deserialization issue within the React Flight Protocol (RFP) (Wiz, Sophos). This protocol is the mechanism used by RSC to stream complex data structures between the client (browser) and the server.

  • The Flaw: When a client submits data (such as form data) to a React Server Function, the server receives it as numbered "chunks" of serialized data. The vulnerability lies in how the server attempts to deserialize (convert this network data back into internal JavaScript objects) without proper validation.

  • The Attack: An attacker sends a specially crafted, malicious HTTP request containing a payload. This payload exploits the missing type checks during the deserialization process, allowing the attacker's data to interfere with how the application executes code internally (Trend Micro, Wiz).

  • The Result: The attacker achieves Remote Code Execution (RCE), allowing them to run arbitrary, privileged JavaScript commands on the server with the same permissions as the running application process. Crucially, this attack is pre-authentication, requiring no credentials or user interaction (JFrog, Rapid7).

The vulnerability affects React 19.x versions and downstream frameworks that utilize RSC, most notably Next.js 15.x/16.x using the App Router (JFrog, SOC Prime).

The Exploitation Tsunami: Automated, Malicious, and Indiscriminate

Within hours of the vulnerability's disclosure on December 3, 2025, security researchers observed active exploitation attempts, and the intensity has only grown (Rapid7, Google Cloud Blog).

Payload Diversity

Attackers are deploying a wide array of malicious payloads, often leveraging automated scanning tools that do not differentiate between target operating systems or industries (Huntress, Bitdefender):

  • Cryptocurrency Miners: The most common payload, including XMRig, used to illicitly mine cryptocurrency by exploiting server resources (Google Cloud Blog, Huntress).

  • Backdoors and Stealers: Deployment of sophisticated malware like the SNOWLIGHT downloader, HISONIC backdoor, and the MINOCAT tunneler (Google Cloud Blog). Earlier reports also cited the deployment of the VShell Remote Access Trojan (FraudToday).

  • Reconnaissance and Credential Harvesting: Payloads designed to harvest sensitive data, including cloud instance metadata, AWS credentials, and other environment variables containing API keys and database secrets (Wiz).

Exploit Chaos and WAF Bypasses

The public release of multiple Proof-of-Concept (PoC) exploits has lowered the barrier to entry, but has also created a chaotic environment:

  • "AI-Generated Slop": Researchers note a flood of approximately 145 public PoCs on platforms like GitHub, many of which are broken, fake, or outright malicious, intended to infect other security researchers (Dark Reading, Trend Micro).

  • WAF Evasion: The most dangerous variants integrate techniques to bypass Web Application Firewalls (WAFs) deployed by major vendors like Cloudflare and AWS. Threat actors are using custom evasion tactics, such as Unicode-based bypasses, to circumvent default rules, giving a false sense of security to unpatched organizations (Dark Reading).

Mitigation and Defense Strategies

Given the critical nature and ease of exploitation, immediate action is required to secure affected applications.

  1. Patch Immediately (The Definitive Fix): The only complete solution is to update affected packages to the fixed versions released by React and Vercel.

    • React: Update affected packages (e.g., react-server-dom-webpack) to at least 19.0.1, 19.1.2, or 19.2.1 (Google Cloud Blog).

    • Next.js: Apply the latest patches available for the affected 15.x and 16.x versions.

  2. Deploy Runtime Detection: Implement security monitoring solutions (like Falco) to detect the execution of suspicious commands originating from the Node.js/React process, such as whoami, id, uname, and attempts to read sensitive files like /etc/passwd (Sysdig, Cegeka).

  3. Review Historical Logs: Since exploitation began almost immediately after disclosure, organizations should review web server access logs for suspicious HTTP POST requests that contain patterns like next-action or $@ references, which are common indicators of the exploit (Cegeka).

  4. WAF as a Layered Defense: While WAFs can be bypassed, enabling and tuning rules that block known exploit patterns remains a vital part of a layered defense strategy (Cloudflare, JFrog).

BeKnow Online Welcome to WhatsApp chat
Howdy! How can we help you today?
Type here...