China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
The React2Shell vulnerability (CVE-2025-55182) is a critical security flaw affecting React Server Components in React versions 19. x and Next. js versions 15. x and 16. x when using App Router. China state-sponsored threat groups, including Earth Lamia and Jackpot Panda, rapidly began exploiting this vulnerability within hours of its public disclosure in December 2025. The vulnerability allows unauthenticated remote code execution, posing a severe risk to affected web applications. Although no confirmed exploits in the wild have been reported yet, active exploitation attempts have been observed. The vulnerability's critical nature and rapid exploitation by advanced persistent threat actors make it a significant concern for organizations using these frameworks. European organizations relying on React and Next.
AI Analysis
Technical Summary
CVE-2025-55182, dubbed React2Shell, is a critical vulnerability discovered in React Server Components affecting React 19.x and Next.js 15.x and 16.x versions when using the App Router feature. This vulnerability enables unauthenticated attackers to execute arbitrary code remotely by exploiting flaws in the server-side rendering process of React applications. The vulnerability was publicly disclosed on December 3, 2025, and within hours, multiple China state-sponsored threat groups, notably Earth Lamia and Jackpot Panda, were observed actively attempting exploitation. These groups are known for targeting strategic sectors and leveraging zero-day vulnerabilities for espionage and disruption. The vulnerability carries a theoretical CVSS score of 10.0, indicating maximum severity, although the provided data lists severity as medium, likely reflecting initial uncertainty or incomplete impact assessment. The attack vector involves sending crafted requests to vulnerable React Server Components, triggering execution of malicious payloads on the server. This can lead to full system compromise, data theft, or deployment of further malware. The threat actors have been observed using IP addresses linked to known malicious infrastructure. No confirmed widespread exploitation has been reported yet, but the rapid weaponization and targeting by advanced threat actors underscore the urgency. The vulnerability affects a broad range of web applications built on popular JavaScript frameworks, making it a high-value target for attackers. The lack of official patch links in the data suggests that organizations must monitor vendor advisories closely and apply mitigations promptly once available.
Potential Impact
For European organizations, the React2Shell vulnerability poses a critical risk to confidentiality, integrity, and availability of web applications and backend systems using React 19.x or Next.js 15.x/16.x with App Router. Exploitation could lead to unauthorized access to sensitive data, disruption of services, and potential lateral movement within networks. Sectors such as finance, government, telecommunications, and critical infrastructure that rely heavily on modern web technologies are particularly vulnerable. The involvement of China state-sponsored groups indicates a likelihood of targeted attacks against strategic European entities for espionage or sabotage. The rapid exploitation attempts shortly after disclosure highlight the threat's immediacy. Organizations with public-facing React-based applications could face defacement, data breaches, or ransomware deployment. The broad adoption of React and Next.js in Europe increases the attack surface, and the lack of immediate patches could prolong exposure. Additionally, supply chain risks exist if third-party services or libraries incorporate vulnerable components. The overall impact could include reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions.
Mitigation Recommendations
1. Immediately inventory all web applications and services using React 19.x and Next.js 15.x or 16.x with App Router to identify vulnerable instances. 2. Monitor official React and Next.js security advisories and apply patches or updates as soon as they are released. 3. Implement Web Application Firewalls (WAF) with custom rules to detect and block exploitation attempts targeting the React2Shell vulnerability. 4. Employ runtime application self-protection (RASP) tools to detect anomalous behavior indicative of exploitation. 5. Restrict network exposure of server-side rendering endpoints to trusted networks where possible. 6. Conduct thorough code reviews and penetration testing focusing on server-side rendering components to identify and remediate insecure coding practices. 7. Enhance logging and monitoring to detect suspicious requests or unusual server activity related to React Server Components. 8. Educate development teams about secure usage of React Server Components and the risks of untrusted input processing. 9. Consider temporary mitigation by disabling or isolating App Router features if patching is delayed. 10. Collaborate with threat intelligence providers to stay informed about emerging exploitation tactics and indicators of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
Indicators of Compromise
- cve: CVE-2025-1338
- cve: CVE-2025-55182
- ip: 143.198.92.82
- ip: 183.6.80.214
- ip: 206.237.3.150
- ip: 45.77.33.136
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
Description
The React2Shell vulnerability (CVE-2025-55182) is a critical security flaw affecting React Server Components in React versions 19. x and Next. js versions 15. x and 16. x when using App Router. China state-sponsored threat groups, including Earth Lamia and Jackpot Panda, rapidly began exploiting this vulnerability within hours of its public disclosure in December 2025. The vulnerability allows unauthenticated remote code execution, posing a severe risk to affected web applications. Although no confirmed exploits in the wild have been reported yet, active exploitation attempts have been observed. The vulnerability's critical nature and rapid exploitation by advanced persistent threat actors make it a significant concern for organizations using these frameworks. European organizations relying on React and Next.
AI-Powered Analysis
Technical Analysis
CVE-2025-55182, dubbed React2Shell, is a critical vulnerability discovered in React Server Components affecting React 19.x and Next.js 15.x and 16.x versions when using the App Router feature. This vulnerability enables unauthenticated attackers to execute arbitrary code remotely by exploiting flaws in the server-side rendering process of React applications. The vulnerability was publicly disclosed on December 3, 2025, and within hours, multiple China state-sponsored threat groups, notably Earth Lamia and Jackpot Panda, were observed actively attempting exploitation. These groups are known for targeting strategic sectors and leveraging zero-day vulnerabilities for espionage and disruption. The vulnerability carries a theoretical CVSS score of 10.0, indicating maximum severity, although the provided data lists severity as medium, likely reflecting initial uncertainty or incomplete impact assessment. The attack vector involves sending crafted requests to vulnerable React Server Components, triggering execution of malicious payloads on the server. This can lead to full system compromise, data theft, or deployment of further malware. The threat actors have been observed using IP addresses linked to known malicious infrastructure. No confirmed widespread exploitation has been reported yet, but the rapid weaponization and targeting by advanced threat actors underscore the urgency. The vulnerability affects a broad range of web applications built on popular JavaScript frameworks, making it a high-value target for attackers. The lack of official patch links in the data suggests that organizations must monitor vendor advisories closely and apply mitigations promptly once available.
Potential Impact
For European organizations, the React2Shell vulnerability poses a critical risk to confidentiality, integrity, and availability of web applications and backend systems using React 19.x or Next.js 15.x/16.x with App Router. Exploitation could lead to unauthorized access to sensitive data, disruption of services, and potential lateral movement within networks. Sectors such as finance, government, telecommunications, and critical infrastructure that rely heavily on modern web technologies are particularly vulnerable. The involvement of China state-sponsored groups indicates a likelihood of targeted attacks against strategic European entities for espionage or sabotage. The rapid exploitation attempts shortly after disclosure highlight the threat's immediacy. Organizations with public-facing React-based applications could face defacement, data breaches, or ransomware deployment. The broad adoption of React and Next.js in Europe increases the attack surface, and the lack of immediate patches could prolong exposure. Additionally, supply chain risks exist if third-party services or libraries incorporate vulnerable components. The overall impact could include reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions.
Mitigation Recommendations
1. Immediately inventory all web applications and services using React 19.x and Next.js 15.x or 16.x with App Router to identify vulnerable instances. 2. Monitor official React and Next.js security advisories and apply patches or updates as soon as they are released. 3. Implement Web Application Firewalls (WAF) with custom rules to detect and block exploitation attempts targeting the React2Shell vulnerability. 4. Employ runtime application self-protection (RASP) tools to detect anomalous behavior indicative of exploitation. 5. Restrict network exposure of server-side rendering endpoints to trusted networks where possible. 6. Conduct thorough code reviews and penetration testing focusing on server-side rendering components to identify and remediate insecure coding practices. 7. Enhance logging and monitoring to detect suspicious requests or unusual server activity related to React Server Components. 8. Educate development teams about secure usage of React Server Components and the risks of untrusted input processing. 9. Consider temporary mitigation by disabling or isolating App Router features if patching is delayed. 10. Collaborate with threat intelligence providers to stay informed about emerging exploitation tactics and indicators of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/"]
- Adversary
- China-nexus
- Pulse Id
- 69331d05a7d525a2c1cf508c
- Threat Score
- null
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2025-1338 | — | |
cveCVE-2025-55182 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip143.198.92.82 | — | |
ip183.6.80.214 | — | |
ip206.237.3.150 | — | |
ip45.77.33.136 | — |
Threat ID: 69331db4f88dbe026c0066bb
Added to database: 12/5/2025, 6:00:20 PM
Last enriched: 12/5/2025, 6:16:07 PM
Last updated: 12/6/2025, 2:50:04 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
HighCloudflare Blocks Aisuru Botnet Powered Largest Ever 29.7 Tbps DDoS Attack
MediumMicrosoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
HighDNS Uncovers Infrastructure Used in SSO Attacks
MediumDjango 5.1.13 - SQL Injection
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.