More

    Severe React2Shell Vulnerability Included in CISA KEV Following Verification of Active Exploitation

    Understanding the React2Shell Vulnerability: A Deep Dive into CVE-2025-55182

    On December 6, 2025, a critical security flaw impacting React Server Components (RSC) was officially added to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. This alarming development follows multiple reports of its active exploitation, highlighting the pressing need for developers and organizations across the globe to address this vulnerability urgently.

    The Nature of the Vulnerability

    The vulnerability, denoted as CVE-2025-55182, has garnered a maximum CVSS score of 10.0, indicating its severity. As a case of remote code execution (RCE), it allows unauthenticated attackers to exploit the flaw without any special setup, emphasizing its dangerous nature. Tracked commonly as React2Shell, this flaw targets how React decodes payloads sent to React Server Function endpoints, potentially opening a gateway for unauthorized command execution.

    Insecure Deserialization and Its Consequences

    At the heart of this vulnerability is a critical flaw in the Flight protocol, responsible for facilitating communication between server and client in React. Specifically, it arises from insecure deserialization processes within the React library. This means that when serialized objects are converted back into their original form, malicious input can execute arbitrary commands on the server simply by sending specially crafted HTTP requests.

    Martin Zugec, a technical solutions director at Bitdefender, remarked on the inherent risks associated with this vulnerability class. He noted that the React2Shell vulnerability lies in how React parses object references during deserialization, a process often deemed perilous.

    Updates and Mitigations

    The React developer community acted swiftly to mitigate this vulnerability. Patches addressing the flaw have been released in versions 19.0.1, 19.1.2, and 19.2.1 of the following libraries:

    • react-server-dom-webpack
    • react-server-dom-parcel
    • react-server-dom-turbopack

    Many downstream frameworks that rely on React, such as Next.js, React Router, Waku, Parcel, Vite, and RedwoodSDK, are also affected. This broad impact highlights the interconnectedness of modern web libraries and frameworks, amplifying the urgency for developers to update their systems.

    Active Exploitation in the Wild

    Shortly after the public disclosure of CVE-2025-55182, major security firms, including Amazon, noted attempts to exploit this vulnerability from hacking groups linked to China, such as Earth Lamia and Jackpot Panda. Reports indicate that various organizations observed attacks leveraging this flaw, transitioning from mere scans to deploying active cryptocurrency miners and executing rudimentary PowerShell commands to confirm successful exploitation. These actions were often followed by running commands that would drop in-memory downloaders for additional malicious payloads.

    According to Censys, approximately 2.15 million instances of internet-facing services could be exposed to this vulnerability, encompassing both React Server Components and associated frameworks. Thus, the scale of potential exploitation is staggering.

    Widespread Impact and Targeted Attacks

    Recent reports from Palo Alto Networks’ Unit 42 confirmed that over 30 organizations in multiple sectors are affected. Some of these attacks aligned with the tactics employed by the Chinese hacking crew UNC5174, linked to previous high-profile exploitation. The observed activities include reconnaissance efforts to steal AWS configurations and credential files, alongside the installation of downloaders to retrieve payloads from attacker-controlled infrastructure.

    Proof-of-Concept Exploits and Community Response

    Security researcher Lachlan Davidson, credited with discovering the flaw, has shared several proofs of concept on various platforms, warning users of imminent threats. Additional exploits have emerged from the community, emphasizing the need for developers to act quickly to secure their systems. Moreover, federal agencies must comply with Binding Operational Directive (BOD) 22-01, mandating them to implement necessary updates by December 26, 2025.

    The Future of Web Security

    As the digital ecosystem continues to evolve, vulnerabilities like CVE-2025-55182 remind us of the importance of rigorous security practices. The interconnected nature of modern web technologies necessitates a proactive stance on vulnerability management, requiring constant vigilance from developers and organizations alike to safeguard their systems against emerging threats.

    Latest articles

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    Popular