Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The vulnerability, CVE-2025-55182 (CVSS score: 10.0), relates to a case of remote code execution that could be triggered by an
AI Analysis
Technical Summary
The React2Shell vulnerability (CVE-2025-55182) is a critical remote code execution (RCE) flaw in Meta's React Server Components (RSC), specifically within the react-server package. It stems from insecure deserialization in the Flight protocol, which React uses to communicate between client and server. Deserialization vulnerabilities occur when untrusted input is converted into executable objects without proper validation, allowing attackers to craft malicious payloads that execute arbitrary code. In this case, an unauthenticated remote attacker can send specially crafted HTTP requests to React Server Function endpoints, triggering arbitrary command execution on the server. This vulnerability affects multiple React server-side libraries (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) and downstream frameworks such as Next.js, React Router, Waku, Parcel, Vite, and RedwoodSDK, expanding the attack surface significantly. The flaw was rapidly exploited in the wild by various threat actors, including Chinese state-affiliated groups like Earth Lamia and Jackpot Panda, as well as others observed by security firms like Coalition, Fastly, GreyNoise, and Palo Alto Networks Unit 42. Exploitation attempts have included reconnaissance, AWS credential theft, deployment of cryptocurrency miners, and in-memory downloaders that fetch additional payloads. The vulnerability has a CVSS score of 10.0, indicating maximum severity. Patches addressing the flaw have been released in React versions 19.0.1, 19.1.2, and 19.2.1, and organizations are urged to update immediately. The vulnerability's discovery and public proof-of-concept exploits have accelerated attack attempts, making timely patching critical. The U.S. government has mandated patching by December 26, 2025, for federal agencies under BOD 22-01. The vulnerability's exploitation leverages the dangerous class of insecure deserialization, which is notoriously difficult to secure and often leads to severe impacts such as full system compromise.
Potential Impact
For European organizations, the React2Shell vulnerability poses a severe risk due to the widespread use of React and its dependent frameworks in web applications and services. Successful exploitation can lead to full remote code execution on servers, allowing attackers to execute arbitrary commands, deploy malware such as cryptocurrency miners, steal sensitive credentials (including AWS configuration files), and establish persistent footholds. This could result in data breaches, service disruptions, financial losses, and reputational damage. The vulnerability affects internet-facing services, increasing the likelihood of exposure. Given the active exploitation by sophisticated threat actors, including those linked to nation-states, European critical infrastructure, enterprises, and government agencies using these technologies are at heightened risk. The broad adoption of affected frameworks in sectors such as finance, e-commerce, telecommunications, and public services amplifies potential impact. Additionally, the theft of cloud credentials could lead to further compromise of cloud environments, escalating the severity. The rapid weaponization of proof-of-concept exploits further increases the urgency for mitigation.
Mitigation Recommendations
European organizations should immediately identify all instances of React Server Components and dependent frameworks (Next.js, React Router, Waku, Parcel, Vite, RedwoodSDK) in their environments. They must apply the official patches released in React versions 19.0.1, 19.1.2, and 19.2.1 without delay. Where patching is not immediately feasible, organizations should implement network-level controls to restrict access to vulnerable endpoints, such as web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting React Server Function endpoints. Conduct thorough audits of internet-facing services to reduce exposure and disable or isolate vulnerable components if possible. Monitor logs and network traffic for indicators of compromise, including unusual HTTP requests, PowerShell command executions, and signs of cryptocurrency miner deployment. Employ threat intelligence feeds to detect scanning and exploitation attempts. Review and rotate cloud credentials, especially AWS keys, to mitigate credential theft risks. Implement strict access controls and segmentation to limit lateral movement if compromise occurs. Finally, educate development teams on secure deserialization practices and incorporate security testing for deserialization vulnerabilities in CI/CD pipelines to prevent future occurrences.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
Description
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The vulnerability, CVE-2025-55182 (CVSS score: 10.0), relates to a case of remote code execution that could be triggered by an
AI-Powered Analysis
Technical Analysis
The React2Shell vulnerability (CVE-2025-55182) is a critical remote code execution (RCE) flaw in Meta's React Server Components (RSC), specifically within the react-server package. It stems from insecure deserialization in the Flight protocol, which React uses to communicate between client and server. Deserialization vulnerabilities occur when untrusted input is converted into executable objects without proper validation, allowing attackers to craft malicious payloads that execute arbitrary code. In this case, an unauthenticated remote attacker can send specially crafted HTTP requests to React Server Function endpoints, triggering arbitrary command execution on the server. This vulnerability affects multiple React server-side libraries (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) and downstream frameworks such as Next.js, React Router, Waku, Parcel, Vite, and RedwoodSDK, expanding the attack surface significantly. The flaw was rapidly exploited in the wild by various threat actors, including Chinese state-affiliated groups like Earth Lamia and Jackpot Panda, as well as others observed by security firms like Coalition, Fastly, GreyNoise, and Palo Alto Networks Unit 42. Exploitation attempts have included reconnaissance, AWS credential theft, deployment of cryptocurrency miners, and in-memory downloaders that fetch additional payloads. The vulnerability has a CVSS score of 10.0, indicating maximum severity. Patches addressing the flaw have been released in React versions 19.0.1, 19.1.2, and 19.2.1, and organizations are urged to update immediately. The vulnerability's discovery and public proof-of-concept exploits have accelerated attack attempts, making timely patching critical. The U.S. government has mandated patching by December 26, 2025, for federal agencies under BOD 22-01. The vulnerability's exploitation leverages the dangerous class of insecure deserialization, which is notoriously difficult to secure and often leads to severe impacts such as full system compromise.
Potential Impact
For European organizations, the React2Shell vulnerability poses a severe risk due to the widespread use of React and its dependent frameworks in web applications and services. Successful exploitation can lead to full remote code execution on servers, allowing attackers to execute arbitrary commands, deploy malware such as cryptocurrency miners, steal sensitive credentials (including AWS configuration files), and establish persistent footholds. This could result in data breaches, service disruptions, financial losses, and reputational damage. The vulnerability affects internet-facing services, increasing the likelihood of exposure. Given the active exploitation by sophisticated threat actors, including those linked to nation-states, European critical infrastructure, enterprises, and government agencies using these technologies are at heightened risk. The broad adoption of affected frameworks in sectors such as finance, e-commerce, telecommunications, and public services amplifies potential impact. Additionally, the theft of cloud credentials could lead to further compromise of cloud environments, escalating the severity. The rapid weaponization of proof-of-concept exploits further increases the urgency for mitigation.
Mitigation Recommendations
European organizations should immediately identify all instances of React Server Components and dependent frameworks (Next.js, React Router, Waku, Parcel, Vite, RedwoodSDK) in their environments. They must apply the official patches released in React versions 19.0.1, 19.1.2, and 19.2.1 without delay. Where patching is not immediately feasible, organizations should implement network-level controls to restrict access to vulnerable endpoints, such as web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting React Server Function endpoints. Conduct thorough audits of internet-facing services to reduce exposure and disable or isolate vulnerable components if possible. Monitor logs and network traffic for indicators of compromise, including unusual HTTP requests, PowerShell command executions, and signs of cryptocurrency miner deployment. Employ threat intelligence feeds to detect scanning and exploitation attempts. Review and rotate cloud credentials, especially AWS keys, to mitigate credential theft risks. Implement strict access controls and segmentation to limit lateral movement if compromise occurs. Finally, educate development teams on secure deserialization practices and incorporate security testing for deserialization vulnerabilities in CI/CD pipelines to prevent future occurrences.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/critical-react2shell-flaw-added-to-cisa.html","fetched":true,"fetchedAt":"2025-12-06T11:45:05.141Z","wordCount":1177}
Threat ID: 6934174311364f3ab440a492
Added to database: 12/6/2025, 11:45:07 AM
Last enriched: 12/6/2025, 11:45:25 AM
Last updated: 12/6/2025, 3:19:02 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
LowChinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
CriticalCloudflare Outage Caused by React2Shell Mitigations
CriticalReact2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
CriticalCritical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.