Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Famous Israeli VC John Medved, who was diagnosed with ALS, championed technology to improve his life.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » React2Shell exploit escalates into massive global attack, forcing emergency mitigation
Identity

React2Shell exploit escalates into massive global attack, forcing emergency mitigation

userBy userDecember 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 12, 2025Ravi LakshmananVulnerability/Threat Intelligence

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has asked federal agencies to patch recent vulnerabilities in React2Shell by December 12, 2025, amid reports of widespread exploitation.

This critical vulnerability is tracked as CVE-2025-55182 (CVSS score: 10.0) and affects the React Server Components (RSC) Flight protocol. The root cause of this issue is insecure deserialization that allows an attacker to inject malicious logic that causes the server to execute in a privileged context. Other frameworks such as Next.js, Waku, Vite, React Router, and RedwoodSDK are also affected.

“A single specially crafted HTTP request is sufficient; no authentication requirements, user interaction, or elevated privileges are required,” says Cloudforce One, Cloudflare’s threat intelligence team. “A successful exploit could allow the attacker to execute arbitrary privileged JavaScript on the affected server.”

Since this vulnerability was disclosed on December 3, 2025, this flaw has been exploited by multiple attackers in various campaigns, participating in reconnaissance operations, and distributing various malware families.

cyber security

Following this development, CISA last Friday added the vulnerability to its catalog of known exploited vulnerabilities and gave federal agencies until Dec. 26 to apply a fix. The deadline was later changed to December 12, 2025 to reflect the seriousness of the incident.

Cloud security firm Wiz said it has observed a “rapid wave of opportunistic exploitation” of the flaw, with the majority of attacks targeting internet-facing Next.js applications and other containerized workloads running on Kubernetes and managed cloud services.

Image source: Cloudflare

Cloudflare, which is also tracking ongoing exploit activity, said the attackers conducted searches using Internet-wide scans and asset discovery platforms and discovered exposed systems running React and Next.js applications. Notably, some reconnaissance operations exclude Chinese IP address space from searches.

“Their highest-density investigations were conducted against networks in Taiwan, Xinjiang, Vietnam, Japan, and New Zealand. These regions are frequently associated with geopolitical intelligence gathering priorities,” the web infrastructure company said.

The observed activity is said to also target government (.gov) websites, academic research institutions, and critical infrastructure operators, although to a more limited extent. This included national authorities responsible for importing and exporting uranium, rare metals, and nuclear fuel.

Some of the other notable discoveries are listed below.

Prioritize targeting sensitive technologies such as enterprise password managers and secure vault services for the purpose of conducting supply chain attacks Target edge-facing SSL VPN appliances that may have React-based components built into their management interfaces Initial scanning and exploitation attempts originating from IP addresses previously associated with Asia-related threat clusters

In an analysis of its own honeypot data, Kaspersky Lab said it recorded more than 35,000 exploit attempts in a single day on December 10, 2025, with attackers first probing the system by running commands such as whoami, and then dropping crypto miners and botnet malware families such as Mirai/Gafgyt variants and RondoDox.

Security researcher Rakesh Krishnan also discovered an Open Directory hosted at ‘154.61.77’.[.]105:8082” contains a proof-of-concept (PoC) exploit script for CVE-2025–55182 and two other files –

“domains.txt” contains a list of 35,423 domains. “next_target.txt” contains a list of 596 URLs, including companies such as Dia Browser, Starbucks, Porsche, and Lululemon.

cyber security

It is estimated that an unknown attacker is actively scanning the Internet based on the targets added in the second file, infecting hundreds of pages in the process.

According to the latest data from The Shadowserver Foundation, as of December 11, 2025, there are more than 137,200 internet-exposed IP addresses running vulnerable code. Of these, more than 88,900 instances are located in the United States, followed by Germany (10,900), France (5,500), and India (3,600).


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe rise of the space sector in the North East of England
Next Article New React RSC vulnerability allows DoS and source code disclosure
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Famous Israeli VC John Medved, who was diagnosed with ALS, championed technology to improve his life.

Iran’s Infy APT resurfaces with new malware activity after years of silence

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.