Major React2Shell Vulnerability Added to CISA KEV Following Active Exploits

Published:

spot_img

U.S. CISA Flags React Server Components Vulnerability

On December 6, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially listed a serious security vulnerability impacting React Server Components (RSC) in its Known Exploited Vulnerabilities (KEV) catalog. This move came after reports surfaced indicating active exploitation in various environments.

Understanding the Vulnerability

Identified as CVE-2025-55182, this flaw boasts a perfect CVSS score of 10.0, indicating its critical nature. The vulnerability allows remote code execution (RCE), which can be triggered by an unauthenticated attacker without the need for any special prerequisites. Also known as React2Shell, this flaw raises significant security concerns for developers working with React.

CISA explained in an advisory that the vulnerability exists within the Meta React Server Components. This flaw enables unauthenticated remote code execution due to an issue with how React decodes payloads sent to React Server Function endpoints. The core problem lies in the insecure deserialization within the library’s Flight protocol, which React uses for server-client communication. Consequently, a remote attacker can potentially execute arbitrary commands on the server by crafting specific HTTP requests.

Technical Insights

According to Martin Zugec, technical solutions director at Bitdefender, deserialization vulnerabilities are among the most dangerous classes of software issues. He highlighted that the React2Shell vulnerability is located in the react-server package, particularly within the deserialization process of object references.

This flaw has been addressed in updated versions of several libraries, including:

  • react-server-dom-webpack
  • react-server-dom-parcel
  • react-server-dom-turbopack

Developers utilizing frameworks like Next.js, React Router, Waku, Parcel, Vite, and RedwoodSDK, which depend on React, should also be aware that they are at risk.

Recent Exploit Attempts

Following the public announcement of this vulnerability, Amazon reported an increase in attack attempts linked to Chinese hacking groups such as Earth Lamia and Jackpot Panda. Other cybersecurity firms, including Coalition, Fastly, GreyNoise, and VulnCheck, confirmed observing similar exploitation efforts, which indicates that multiple threat actors are seizing the opportunity to attack.

Some of these attack efforts have resulted in deploying cryptocurrency miners, in addition to running PowerShell commands to verify successful exploitation. Attackers are then able to execute commands that retrieve further malicious payloads from remote servers.

Scope of the Impact

Data from attack surface management platform Censys reveals that there are approximately 2.15 million internet-facing services susceptible to this vulnerability. This number includes exposed web services that utilize React Server Components and frameworks like Next.js and Waku.

Palo Alto Networks Unit 42 has identified at least 30 affected organizations across different sectors. They have also observed techniques consistent with a known Chinese hacking group, UNC5174 (also referred to as CL-STA-1015). These attacks typically involve deploying SNOWLIGHT and VShell tools.

Justin Moore of Palo Alto Networks highlighted that their findings indicate activities like scanning for RCE vulnerabilities, reconnaissance efforts, and attempts to steal AWS configuration and credential files. Installation of downloaders designed to fetch payloads from command and control setups has also been reported.

The security researcher Lachlan Davidson, who was pivotal in discovering the flaw, has released several proof-of-concept (PoC) exploits. This emphasis on urgency means that it is critical for users to update their systems to the latest versions immediately. A fellow researcher under the GitHub handle maple3142 has also shared a working PoC.

Under the Binding Operational Directive (BOD) 22-01, agencies within the Federal Civilian Executive Branch (FCEB) are mandated to implement necessary updates to secure their networks by December 26, 2025.

spot_img

Related articles

Recent articles

Barts Health Confirms Cl0p Ransomware Caused Data Breach via Oracle Vulnerability

## Understanding the Barts Health Data Breach Barts Health NHS Trust recently confirmed that a significant data breach was executed by the Russian-speaking Cl0p ransomware...

Kuwait Bans Drug-Themed Clothing Amid Intensified Crackdown

## Kuwait Implements Strict Penalties for Drug-Related Imagery Kuwait has taken a decisive step in its fight against drug-related activities by announcing stringent penalties for...

Gaming Fraud Network Connecting Rudrapur and Dubai Exposed: ₹5.54 Crore Lost Through Apps

RUDRAPUR: Police in Uttarakhand have revealed a vast online gaming fraud operation stretching from Rudrapur to Dubai. This scheme has ensnared thousands of individuals,...

Bihar Shocker: Halwai Discovers ₹600 Crore in Bank Account, Police Investigation Launched

The ₹600 Crore Mystery: A Sweet Maker's Unbelievable Bank Account Discovery Barka Rajpur Village in Shock Residents of the tranquil Barka Rajpur village, located in the...