Critical React Server Components (RSC) Bugs Enable Unauthenticated Remote Code Execution
Summary
Hide ▲
Show ▼
A critical security vulnerability (CVE-2025-55182, CVSS 10.0) in React Server Components (RSC) allows unauthenticated remote code execution due to unsafe deserialization of payloads. The flaw affects multiple versions of React and Next.js, potentially impacting any application using RSC. The issue has been patched, but 39% of cloud environments remain vulnerable. Cloudflare experienced a widespread outage due to an emergency patch for this vulnerability, and multiple China-linked hacking groups have begun exploiting it. NHS England National CSOC has warned of the likelihood of continued exploitation in the wild. Major companies such as Google Cloud, AWS, and Cloudflare immediately responded to the vulnerability. The security researcher Lachlan Davidson disclosed the vulnerability on November 29, 2025, to the Meta team. The flaw has been dubbed React2Shell, a nod to the Log4Shell vulnerability discovered in 2021. The US National Vulnerability Database (NVD) rejected CVE-2025-66478 as a duplicate of CVE-2025-55182. Exploitation success rate is reported to be nearly 100% in default configurations. React servers that use React Server Function endpoints are known to be vulnerable. The Next.js web application is also vulnerable in its default configuration. At the time of writing, it is unknown if active exploitation has occurred, but there have been some reports of observed exploitation activity as of December 5, 2026. OX Security warned that the flaw is now actively exploitable on December 5, around 10am GMT. Hacker maple3142 published a working PoC, and OX Security successfully verified it. JFrog identified fake proof-of-concepts (PoC) on GitHub, warning security teams to verify sources before testing. Cloudflare started investigating issues on December 5 at 08:56 UTC, and a fix was rolled out within half an hour, but by that time outages had been reported by several major internet services, including Zoom, LinkedIn, Coinbase, DoorDash, and Canva. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on December 6, 2025, following confirmed active exploitation. The vulnerability is tracked as React2Shell and is related to a remote code execution flaw in React Server Components (RSC). The flaw is due to insecure deserialization in the Flight protocol used by React to communicate between a server and client. The vulnerability affects versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack. Patched versions of React are 19.0.1, 19.1.2, and 19.2.1. Downstream frameworks impacted include Next.js, React Router, Waku, Parcel, Vite, and RedwoodSDK. Amazon reported attack attempts from Chinese hacking groups like Earth Lamia and Jackpot Panda within hours of public disclosure. Coalition, Fastly, GreyNoise, VulnCheck, and Wiz reported seeing exploitation efforts targeting the flaw. Some attacks involved the deployment of cryptocurrency miners and the execution of "cheap math" PowerShell commands. Censys identified about 2.15 million instances of internet-facing services potentially affected by the vulnerability. Palo Alto Networks Unit 42 confirmed over 30 affected organizations across numerous sectors, with activity consistent with Chinese hacking group UNC5174. Security researcher Lachlan Davidson released multiple proof-of-concept (PoC) exploits for the vulnerability. Another working PoC was published by a Taiwanese researcher with the GitHub handle maple3142. Federal Civilian Executive Branch (FCEB) agencies have until December 26, 2025, to apply the necessary updates to secure their networks. Over 77,000 Internet-exposed IP addresses are vulnerable to the critical React2Shell remote code execution flaw (CVE-2025-55182). Researchers have confirmed that attackers have already compromised over 30 organizations across multiple sectors using the React2Shell flaw. Shadowserver detected 77,664 IP addresses vulnerable to the React2Shell flaw, with approximately 23,700 in the United States. GreyNoise recorded 181 distinct IP addresses attempting to exploit the flaw over the past 24 hours, with most of the traffic appearing automated. Attackers frequently begin with PowerShell commands that perform a basic math function to confirm the device is vulnerable to the remote code execution flaw. Once remote code execution was confirmed, attackers were seen executing base64-encoded PowerShell commands that download additional scripts directly into memory. One observed command executes a second-stage PowerShell script from the external site (23[.]235[.]188[.]3), which is used to disable AMSI to bypass endpoint security and deploy additional payloads. The PowerShell script observed by GreyNoise installs a Cobalt Strike beacon on the targeted device, giving threat actors a foothold on the network. Amazon AWS threat intelligence teams saw rapid exploitation hours after the disclosure of the React CVE-2025-55182 flaw, with infrastructure associated with China-linked APT hacking groups known as Earth Lamia and Jackpot Panda. Palo Alto Networks observed similar exploitation, attributing some of it to UNC5174, a Chinese state-sponsored threat actor believed to be tied to the Chinese Ministry of State Security. The deployed malware in these attacks includes Snowlight and Vshell, both commonly used by Chinese hacking groups for remote access, post-exploitation activity, and to move laterally through a compromised network. Earth Lamia is known for exploiting web application vulnerabilities to target organizations across Latin America, the Middle East, and Southeast Asia. Earth Lamia has historically targeted sectors across financial services, logistics, retail, IT companies, universities, and government organizations. Jackpot Panda primarily targets entities in East and Southeast Asia. The Shadowserver Foundation has identified over 77,000 vulnerable IPs following a scan of exposed HTTP services across a wide variety of exposed edge devices and other applications. Censys observed just over 2.15 million instances of internet-facing services that may be affected by this vulnerability, including exposed web services using React Server Components and exposed instances of frameworks such as Next.js, Waku, React Router, and RedwoodSDK. The bug is a pre-authentication remote code execution (RCE) vulnerability which exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. React issued a security advisory with the relevant patches and updates on December 3. Any internet-accessible server running the affected React Server Components code should be assumed vulnerable until updated as a precaution. AWS observed that many threat actors are attempting to use public PoCs that don’t work in real-world scenarios. AWS noted that the use of these PoCs shows that threat actors prioritize rapid operationalization over thorough testing, attempting to exploit targets with any available tool. Using multiple PoCs to scan for vulnerable environments also gives threat actors a higher chance of identifying vulnerable configurations, even if the PoCs are non-functional. The availability of the PoCs also allows less sophisticated actors to participate in exploitation campaigns. Finally, AWS noted that even failed exploitation attempts create significant noise in logs, potentially masking more sophisticated attacks. The invalid PoCs can give developers a false sense of security when testing for React2Shell. The Shadowserver Foundation detected 28,964 IP addresses vulnerable to the React2Shell flaw as of December 7, 2025, down from 77,664 on December 5, with approximately 10,100 located in the U.S., 3,200 in Germany, and 1,690 in China. Huntress observed attackers targeting numerous organizations via CVE-2025-55182, with a focus on the construction and entertainment industries. The first recorded exploitation attempt on a Windows endpoint by Huntress dates back to December 4, 2025, when an unknown threat actor exploited a vulnerable instance of Next.js to drop a shell script, followed by commands to drop a cryptocurrency miner and a Linux backdoor. Attackers were observed launching discovery commands and attempting to download several payloads from a command-and-control (C2) server. Huntress identified a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based post-exploitation implant referred to as ZinFoq. PeerBlight shares code overlaps with two malware families RotaJakiro and Pink that came to light in 2021, installs a systemd service to ensure persistence, and masquerades as a "ksoftirqd" daemon process to evade detection. CowTunnel initiates an outbound connection to attacker-controlled Fast Reverse Proxy (FRP) servers, effectively bypassing firewalls that are configured to only monitor inbound connections. ZinFoq implements a post-exploitation framework with interactive shell, file operations, network pivoting, and timestomping capabilities. Huntress assessed that the threat actor is likely leveraging automated exploitation tooling, supported by the attempts to deploy Linux-specific payloads on Windows endpoints, indicating the automation does not differentiate between target operating systems. PeerBlight supports capabilities to establish communications with a hard-coded C2 server ("185.247.224[.]41:8443"), allowing it to upload/download/delete files, spawn a reverse shell, modify file permissions, run arbitrary binaries, and update itself. ZinFoq beacons out to its C2 server and is equipped to parse incoming instructions to run commands using "/bin/bash," enumerate directories, read or delete files, download more payloads from a specified URL, exfiltrate files and system information, start/stop SOCKS5 proxy, enable/disable TCP port forwarding, alter file access and modification times, and establish a reverse pseudo terminal (PTY) shell connection. ZinFoq takes steps to clear bash history and disguises itself as one of 44 legitimate Linux system services to conceal its presence. CISA has urged federal agencies to patch the React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation. The vulnerability has been exploited by multiple threat actors in various campaigns to engage in reconnaissance efforts and deliver a wide range of malware families. Wiz observed a "rapid wave of opportunistic exploitation" of the flaw, with a vast majority of the attacks targeting internet-facing Next.js applications and other containerized workloads running in Kubernetes and managed cloud services. Cloudflare reported that threat actors have conducted searches using internet-wide scanning and asset discovery platforms to find exposed systems running React and Next.js applications. Some of the reconnaissance efforts have excluded Chinese IP address spaces from their searches. The observed activity targeted government (.gov) websites, academic research institutions, and critical-infrastructure operators. Early scanning and exploitation attempts originated from IP addresses previously associated with Asia-affiliated threat clusters. Kaspersky recorded over 35,000 exploitation attempts on a single day on December 10, 2025, with the attackers first probing the system by running commands like whoami, before dropping cryptocurrency miners or botnet malware families like Mirai/Gafgyt variants and RondoDox. Security researcher Rakesh Krishnan discovered an open directory hosted on "154.61.77[.]105:8082" that includes a proof-of-concept (PoC) exploit script for CVE-2025–55182 along with two other files: "domains.txt," which contains a list of 35,423 domains, and "next_target.txt," which contains a list of 596 URLs, including companies like Dia Browser, Starbucks, Porsche, and Lululemon. The Shadowserver Foundation reported more than 137,200 internet-exposed IP addresses running vulnerable code as of December 11, 2025, with over 88,900 instances located in the U.S., followed by Germany (10,900), France (5,500), and India (3,600). Google's threat intelligence team linked five more Chinese hacking groups to attacks exploiting the React2Shell vulnerability. The list of state-linked threat groups exploiting the flaw now also includes UNC6600, UNC6586, UNC6588, UNC6603, and UNC6595. GTIG researchers observed numerous discussions regarding CVE-2025-55182 in underground forums, including threads where threat actors shared links to scanning tools, proof-of-concept (PoC) code, and their experiences using these tools. GTIG also spotted Iranian threat actors targeting the flaw and financially motivated attackers deploying XMRig cryptocurrency mining software on unpatched systems. Shadowserver Internet watchdog group is currently tracking over 116,000 IP addresses vulnerable to React2Shell attacks, with over 80,000 in the United States. GreyNoise has observed over 670 IP addresses attempting to exploit the React2Shell remote code execution flaw over the past 24 hours, primarily originating from the United States, India, France, Germany, the Netherlands, Singapore, Russia, Australia, the United Kingdom, and China. Threat actors are exploiting the React2Shell vulnerability to deliver malware families like KSwapDoor and ZnDoor. KSwapDoor is a professionally engineered remote access tool designed with stealth in mind, building an internal mesh network and using military-grade encryption. KSwapDoor impersonates a legitimate Linux kernel swap daemon to evade detection. ZnDoor is a remote access trojan that contacts threat actor-controlled infrastructure to receive and execute commands. ZnDoor supports commands such as shell, interactive_shell, explorer, explorer_cat, explorer_delete, explorer_upload, explorer_download, system, change_timefile, socket_quick_startstreams, start_in_port_forward, and stop_in_port. Google identified five China-nexus groups exploiting React2Shell to deliver various payloads, including MINOCAT, SNOWLIGHT, COMPOOD, HISONIC, and ANGRYREBEL. Microsoft reported that threat actors have used the flaw to run arbitrary commands, set up reverse shells, drop RMM tools, and modify authorized_keys files. Payloads delivered in these attacks include VShell, EtherRAT, SNOWLIGHT, ShadowPad, and XMRig. Threat actors used Cloudflare Tunnel endpoints to evade security defenses and conducted reconnaissance for lateral movement and credential theft. Credential harvesting targeted Azure Instance Metadata Service (IMDS) endpoints for Azure, AWS, GCP, and Tencent Cloud. Threat actors deployed secret discovery tools such as TruffleHog and Gitleaks, along with custom scripts to extract various secrets. Beelzebub detailed a campaign exploiting Next.js flaws to extract credentials and sensitive data, including environment files, SSH keys, cloud credentials, and system files. The malware creates persistence, installs a SOCKS5 proxy, establishes a reverse shell, and installs a React scanner for further propagation. Operation PCPcat has breached an estimated 59,128 servers. The Shadowserver Foundation is tracking over 111,000 IP addresses vulnerable to React2Shell attacks, with over 77,800 instances in the U.S. GreyNoise observed 547 malicious IP addresses from the U.S., India, the U.K., Singapore, and the Netherlands partaking in exploitation efforts over the past 24 hours. The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js servers with malware and cryptominers. First documented by Fortinet in July 2025, RondoDox is a large-scale botnet that targets multiple n-day flaws in global attacks. In November, VulnCheck spotted new RondoDox variants that featured exploits for CVE-2025-24893, a critical remote code execution (RCE) vulnerability in the XWiki Platform. A new report from cybersecurity company CloudSEK notes that RondoDox started scanning for vulnerable Next.js servers on December 8 and began deploying botnet clients three days later. React2Shell is an unauthenticated remote code execution vulnerability that can be exploited via a single HTTP request and affects all frameworks that implement the React Server Components (RSC) 'Flight' protocol, including Next.js. The flaw has been leveraged by several threat actors to breach multiple organizations. North Korean hackers exploited React2Shell to deploy a new malware family named EtherRAT. As of December 30, the Shadowserver Foundation reports detecting over 94,000 internet-exposed assets vulnerable to React2Shell. CloudSEK says that RondoDox has passed through three distinct operational phases this year: Reconnaissance and vulnerability testing from March to April 2025, Automated web app exploitation from April to June 2025, Large-scale IoT botnet deployment from July to today. Regarding React2Shell, the researchers report that RondoDox has focused its exploitation around the flaw significantly lately, launching over 40 exploit attempts within six days in December. During this operational phase, the botnet conducts hourly IoT exploitation waves targeting Linksys, Wavlink, and other consumer and enterprise routers to enroll new bots. After probing potentially vulnerable servers, CloudSEK says that RoundDox started to deploy payloads that included a coinminer (/nuts/poop), a botnet loader and health checker (/nuts/bolts), and a variant of Mirai (/nuts/x86). The 'bolts' component removes competing botnet malware from the host, enforces persistence via /etc/crontab, and kills non-whitelisted processes every 45 seconds, the researchers say. CloudSEK provides a set of recommendations for companies to protect against this RondoDox activity, among them auditing and patching Next.js Server Actions, isolating IoT devices into dedicated virtual LANs, and monitoring for suspicious processes being executed. Threat actors targeting cloud environments now favor campaigns which gain initial access by exploiting software vulnerabilities over credential-based attacks. Third-party software-based entry accounted for 44.5% of primary entry vectors during the second half of 2025, up from 2.9% in the first half. Abuse of weak or absent credentials as an entry point dropped from 47.1% in the first half of 2025 to 27.2% in the second half. React2Shell (CVE-2025-55182) was one of the most commonly exploited vulnerabilities to target cloud services. Google Cloud noted that within 48 hours of the public disclosure of React2Shell, multiple threat actors had already exploited the vulnerability to infect victims with cryptocurrency mining malware. The window between vulnerability disclosure and mass exploitation collapsed from weeks to just days. Google Cloud recommended using centralized visibility tools to secure data and automated posture enforcement to mitigate risks. Google Cloud advised organizations to pivot from manual patching to automated defenses, such as patching the Web Application Firewall (WAF), to neutralize exploits at the network edge before software updates can be applied.
Timeline
-
05.12.2025 15:53 6 articles · 3mo ago
Cloudflare Outage Due to Emergency React2Shell Patch
Cloudflare experienced a widespread outage caused by an emergency patch for the React2Shell vulnerability. The outage was due to a change in how Cloudflare's Web Application Firewall parses requests. Multiple China-linked hacking groups, including Earth Lamia and Jackpot Panda, have begun exploiting the React2Shell vulnerability. NHS England National CSOC reported that several functional CVE-2025-55182 proof-of-concept exploits are available, and continued successful exploitation in the wild is highly likely. Major companies such as Google Cloud, AWS, and Cloudflare immediately responded to the vulnerability. Cloudflare started investigating issues on December 5 at 08:56 UTC, and a fix was rolled out within half an hour, but by that time outages had been reported by several major internet services, including Zoom, LinkedIn, Coinbase, DoorDash, and Canva. This is the second significant Cloudflare outage in less than a month.
Show sources
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
-
03.12.2025 20:19 13 articles · 3mo ago
Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
Google's threat intelligence team linked five more Chinese hacking groups to attacks exploiting the React2Shell vulnerability. The list of state-linked threat groups exploiting the flaw now also includes UNC6600, UNC6586, UNC6588, UNC6603, and UNC6595. GTIG researchers observed numerous discussions regarding CVE-2025-55182 in underground forums, including threads where threat actors shared links to scanning tools, proof-of-concept (PoC) code, and their experiences using these tools. GTIG also spotted Iranian threat actors targeting the flaw and financially motivated attackers deploying XMRig cryptocurrency mining software on unpatched systems. Shadowserver Internet watchdog group is currently tracking over 116,000 IP addresses vulnerable to React2Shell attacks, with over 80,000 in the United States. GreyNoise has observed over 670 IP addresses attempting to exploit the React2Shell remote code execution flaw over the past 24 hours, primarily originating from the United States, India, France, Germany, the Netherlands, Singapore, Russia, Australia, the United Kingdom, and China. Threat actors are exploiting the React2Shell vulnerability to deliver malware families like KSwapDoor and ZnDoor. KSwapDoor is a professionally engineered remote access tool designed with stealth in mind, building an internal mesh network and using military-grade encryption. KSwapDoor impersonates a legitimate Linux kernel swap daemon to evade detection. ZnDoor is a remote access trojan that contacts threat actor-controlled infrastructure to receive and execute commands. ZnDoor supports commands such as shell, interactive_shell, explorer, explorer_cat, explorer_delete, explorer_upload, explorer_download, system, change_timefile, socket_quick_startstreams, start_in_port_forward, and stop_in_port. Google identified five China-nexus groups exploiting React2Shell to deliver various payloads, including MINOCAT, SNOWLIGHT, COMPOOD, HISONIC, and ANGRYREBEL. Microsoft reported that threat actors have used the flaw to run arbitrary commands, set up reverse shells, drop RMM tools, and modify authorized_keys files. Payloads delivered in these attacks include VShell, EtherRAT, SNOWLIGHT, ShadowPad, and XMRig. Threat actors used Cloudflare Tunnel endpoints to evade security defenses and conducted reconnaissance for lateral movement and credential theft. Credential harvesting targeted Azure Instance Metadata Service (IMDS) endpoints for Azure, AWS, GCP, and Tencent Cloud. Threat actors deployed secret discovery tools such as TruffleHog and Gitleaks, along with custom scripts to extract various secrets. Beelzebub detailed a campaign exploiting Next.js flaws to extract credentials and sensitive data, including environment files, SSH keys, cloud credentials, and system files. The malware creates persistence, installs a SOCKS5 proxy, establishes a reverse shell, and installs a React scanner for further propagation. Operation PCPcat has breached an estimated 59,128 servers. The Shadowserver Foundation is tracking over 111,000 IP addresses vulnerable to React2Shell attacks, with over 77,800 instances in the U.S. GreyNoise observed 547 malicious IP addresses from the U.S., India, the U.K., Singapore, and the Netherlands partaking in exploitation efforts over the past 24 hours. The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js servers with malware and cryptominers. First documented by Fortinet in July 2025, RondoDox is a large-scale botnet that targets multiple n-day flaws in global attacks. In November, VulnCheck spotted new RondoDox variants that featured exploits for CVE-2025-24893, a critical remote code execution (RCE) vulnerability in the XWiki Platform. A new report from cybersecurity company CloudSEK notes that RondoDox started scanning for vulnerable Next.js servers on December 8 and began deploying botnet clients three days later. React2Shell is an unauthenticated remote code execution vulnerability that can be exploited via a single HTTP request and affects all frameworks that implement the React Server Components (RSC) 'Flight' protocol, including Next.js. The flaw has been leveraged by several threat actors to breach multiple organizations. North Korean hackers exploited React2Shell to deploy a new malware family named EtherRAT. As of December 30, the Shadowserver Foundation reports detecting over 94,000 internet-exposed assets vulnerable to React2Shell. CloudSEK says that RondoDox has passed through three distinct operational phases this year: Reconnaissance and vulnerability testing from March to April 2025, Automated web app exploitation from April to June 2025, Large-scale IoT botnet deployment from July to today. Regarding React2Shell, the researchers report that RondoDox has focused its exploitation around the flaw significantly lately, launching over 40 exploit attempts within six days in December. During this operational phase, the botnet conducts hourly IoT exploitation waves targeting Linksys, Wavlink, and other consumer and enterprise routers to enroll new bots. After probing potentially vulnerable servers, CloudSEK says that RoundDox started to deploy payloads that included a coinminer (/nuts/poop), a botnet loader and health checker (/nuts/bolts), and a variant of Mirai (/nuts/x86). The 'bolts' component removes competing botnet malware from the host, enforces persistence via /etc/crontab, and kills non-whitelisted processes every 45 seconds, the researchers say. CloudSEK provides a set of recommendations for companies to protect against this RondoDox activity, among them auditing and patching Next.js Server Actions, isolating IoT devices into dedicated virtual LANs, and monitoring for suspicious processes being executed. Threat actors targeting cloud environments now favor campaigns which gain initial access by exploiting software vulnerabilities over credential-based attacks. Third-party software-based entry accounted for 44.5% of primary entry vectors during the second half of 2025, up from 2.9% in the first half. Abuse of weak or absent credentials as an entry point dropped from 47.1% in the first half of 2025 to 27.2% in the second half. React2Shell (CVE-2025-55182) was one of the most commonly exploited vulnerabilities to target cloud services. Google Cloud noted that within 48 hours of the public disclosure of React2Shell, multiple threat actors had already exploited the vulnerability to infect victims with cryptocurrency mining malware. The window between vulnerability disclosure and mass exploitation collapsed from weeks to just days. Google Cloud recommended using centralized visibility tools to secure data and automated posture enforcement to mitigate risks. Google Cloud advised organizations to pivot from manual patching to automated defenses, such as patching the Web Application Firewall (WAF), to neutralize exploits at the network edge before software updates can be applied.
Show sources
- Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution — thehackernews.com — 03.12.2025 20:19
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
Information Snippets
-
The vulnerability (CVE-2025-55182) is a logical deserialization flaw in how React decodes payloads sent to React Server Function endpoints.
First reported: 03.12.2025 20:194 sources, 14 articlesShow sources
- Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution — thehackernews.com — 03.12.2025 20:19
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Unauthenticated attackers can craft malicious HTTP requests to Server Function endpoints, leading to arbitrary JavaScript code execution on the server.
First reported: 03.12.2025 20:194 sources, 14 articlesShow sources
- Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution — thehackernews.com — 03.12.2025 20:19
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Affected React versions include 19.0, 19.1.0, 19.1.1, and 19.2.0 of react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack.
First reported: 03.12.2025 20:193 sources, 14 articlesShow sources
- Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution — thehackernews.com — 03.12.2025 20:19
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Patched versions of React are 19.0.1, 19.1.2, and 19.2.1.
First reported: 03.12.2025 20:193 sources, 13 articlesShow sources
- Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution — thehackernews.com — 03.12.2025 20:19
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Next.js is also affected (CVE-2025-66478, CVSS 10.0), impacting versions >=14.3.0-canary.77, >=15, and >=16.
First reported: 03.12.2025 20:193 sources, 14 articlesShow sources
- Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution — thehackernews.com — 03.12.2025 20:19
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Patched versions of Next.js are 16.0.7, 15.5.7, 15.4.8, 15.3.6, 15.2.6, 15.1.9, and 15.0.5.
First reported: 03.12.2025 20:193 sources, 13 articlesShow sources
- Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution — thehackernews.com — 03.12.2025 20:19
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Libraries bundling RSC, such as Vite RSC plugin, Parcel RSC plugin, React Router RSC preview, RedwoodJS, and Waku, are also affected.
First reported: 03.12.2025 20:193 sources, 14 articlesShow sources
- Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution — thehackernews.com — 03.12.2025 20:19
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
39% of cloud environments are vulnerable to CVE-2025-55182 and/or CVE-2025-66478.
First reported: 03.12.2025 20:193 sources, 11 articlesShow sources
- Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution — thehackernews.com — 03.12.2025 20:19
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Cloudflare experienced a widespread outage due to an emergency patch for the React2Shell vulnerability.
First reported: 05.12.2025 15:534 sources, 12 articlesShow sources
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The outage was caused by a change in how Cloudflare's Web Application Firewall parses requests.
First reported: 05.12.2025 15:534 sources, 12 articlesShow sources
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Multiple China-linked hacking groups, including Earth Lamia and Jackpot Panda, have begun exploiting the React2Shell vulnerability.
First reported: 05.12.2025 15:533 sources, 12 articlesShow sources
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
NHS England National CSOC reported that several functional CVE-2025-55182 proof-of-concept exploits are available.
First reported: 05.12.2025 15:533 sources, 12 articlesShow sources
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Continued successful exploitation of the React2Shell vulnerability in the wild is highly likely.
First reported: 05.12.2025 15:533 sources, 13 articlesShow sources
- Cloudflare blames today's outage on emergency React2Shell patch — www.bleepingcomputer.com — 05.12.2025 15:53
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Major companies such as Google Cloud, AWS, and Cloudflare immediately responded to the vulnerability.
First reported: 05.12.2025 17:124 sources, 13 articlesShow sources
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Cloudflare informed customers soon after the public disclosure of CVE-2025-55182 that web application firewall (WAF) protections had been rolled out.
First reported: 05.12.2025 17:124 sources, 11 articlesShow sources
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Cloudflare started investigating issues on December 5 at 08:56 UTC.
First reported: 05.12.2025 17:124 sources, 12 articlesShow sources
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
A fix was rolled out within half an hour, but by that time outages had been reported by several major internet services, including Zoom, LinkedIn, Coinbase, DoorDash, and Canva.
First reported: 05.12.2025 17:124 sources, 13 articlesShow sources
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
This is the second significant Cloudflare outage in less than a month.
First reported: 05.12.2025 17:124 sources, 12 articlesShow sources
- Cloudflare Outage Caused by React2Shell Mitigations — www.securityweek.com — 05.12.2025 17:12
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The security researcher Lachlan Davidson disclosed the vulnerability on November 29, 2025, to the Meta team.
First reported: 05.12.2025 18:003 sources, 12 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The flaw has been dubbed React2Shell, a nod to the Log4Shell vulnerability discovered in 2021.
First reported: 05.12.2025 18:003 sources, 12 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The US National Vulnerability Database (NVD) rejected CVE-2025-66478 as a duplicate of CVE-2025-55182.
First reported: 05.12.2025 18:003 sources, 11 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Exploitation success rate is reported to be nearly 100% in default configurations.
First reported: 05.12.2025 18:003 sources, 12 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
React servers that use React Server Function endpoints are known to be vulnerable.
First reported: 05.12.2025 18:003 sources, 12 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The Next.js web application is also vulnerable in its default configuration.
First reported: 05.12.2025 18:003 sources, 12 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
At the time of writing, it is unknown if active exploitation has occurred, but there have been some reports of observed exploitation activity as of December 5, 2026.
First reported: 05.12.2025 18:003 sources, 11 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
OX Security warned that the flaw is now actively exploitable on December 5, around 10am GMT.
First reported: 05.12.2025 18:003 sources, 11 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Hacker maple3142 published a working PoC, and OX Security successfully verified it.
First reported: 05.12.2025 18:003 sources, 12 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
JFrog identified fake proof-of-concepts (PoC) on GitHub, warning security teams to verify sources before testing.
First reported: 05.12.2025 18:003 sources, 11 articlesShow sources
- React.js Hit by Maximum-Severity 'React2Shell' Vulnerability — www.infosecurity-magazine.com — 05.12.2025 18:00
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
CISA added CVE-2025-55182 to its Known Exploited Vulnerabilities (KEV) catalog on December 6, 2025, following confirmed active exploitation.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The vulnerability is tracked as React2Shell and is related to a remote code execution flaw in React Server Components (RSC).
First reported: 06.12.2025 13:403 sources, 7 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The flaw is due to insecure deserialization in the Flight protocol used by React to communicate between a server and client.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The vulnerability affects versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Patched versions of React are 19.0.1, 19.1.2, and 19.2.1.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Downstream frameworks impacted include Next.js, React Router, Waku, Parcel, Vite, and RedwoodSDK.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Amazon reported attack attempts from Chinese hacking groups like Earth Lamia and Jackpot Panda within hours of public disclosure.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Coalition, Fastly, GreyNoise, VulnCheck, and Wiz reported seeing exploitation efforts targeting the flaw.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Some attacks involved the deployment of cryptocurrency miners and the execution of "cheap math" PowerShell commands.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Censys identified about 2.15 million instances of internet-facing services potentially affected by the vulnerability.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Palo Alto Networks Unit 42 confirmed over 30 affected organizations across numerous sectors, with activity consistent with Chinese hacking group UNC5174.
First reported: 06.12.2025 13:403 sources, 11 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Security researcher Lachlan Davidson released multiple proof-of-concept (PoC) exploits for the vulnerability.
First reported: 06.12.2025 13:403 sources, 10 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Another working PoC was published by a Taiwanese researcher with the GitHub handle maple3142.
First reported: 06.12.2025 13:403 sources, 10 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Federal Civilian Executive Branch (FCEB) agencies have until December 26, 2025, to apply the necessary updates to secure their networks.
First reported: 06.12.2025 13:403 sources, 10 articlesShow sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation — thehackernews.com — 06.12.2025 13:40
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Over 77,000 Internet-exposed IP addresses are vulnerable to the critical React2Shell remote code execution flaw (CVE-2025-55182).
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Researchers have confirmed that attackers have already compromised over 30 organizations across multiple sectors using the React2Shell flaw.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Shadowserver detected 77,664 IP addresses vulnerable to the React2Shell flaw, with approximately 23,700 in the United States.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
GreyNoise recorded 181 distinct IP addresses attempting to exploit the flaw over the past 24 hours, with most of the traffic appearing automated.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Attackers frequently begin with PowerShell commands that perform a basic math function to confirm the device is vulnerable to the remote code execution flaw.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Once remote code execution was confirmed, attackers were seen executing base64-encoded PowerShell commands that download additional scripts directly into memory.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
One observed command executes a second-stage PowerShell script from the external site (23[.]235[.]188[.]3), which is used to disable AMSI to bypass endpoint security and deploy additional payloads.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The PowerShell script observed by GreyNoise installs a Cobalt Strike beacon on the targeted device, giving threat actors a foothold on the network.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Amazon AWS threat intelligence teams saw rapid exploitation hours after the disclosure of the React CVE-2025-55182 flaw, with infrastructure associated with China-linked APT hacking groups known as Earth Lamia and Jackpot Panda.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Palo Alto Networks observed similar exploitation, attributing some of it to UNC5174, a Chinese state-sponsored threat actor believed to be tied to the Chinese Ministry of State Security.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The deployed malware in these attacks includes Snowlight and Vshell, both commonly used by Chinese hacking groups for remote access, post-exploitation activity, and to move laterally through a compromised network.
First reported: 06.12.2025 21:073 sources, 9 articlesShow sources
- React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable — www.bleepingcomputer.com — 06.12.2025 21:07
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Earth Lamia is known for exploiting web application vulnerabilities to target organizations across Latin America, the Middle East, and Southeast Asia.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Earth Lamia has historically targeted sectors across financial services, logistics, retail, IT companies, universities, and government organizations.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Jackpot Panda primarily targets entities in East and Southeast Asia.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The Shadowserver Foundation has identified over 77,000 vulnerable IPs following a scan of exposed HTTP services across a wide variety of exposed edge devices and other applications.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Censys observed just over 2.15 million instances of internet-facing services that may be affected by this vulnerability, including exposed web services using React Server Components and exposed instances of frameworks such as Next.js, Waku, React Router, and RedwoodSDK.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The bug is a pre-authentication remote code execution (RCE) vulnerability which exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
React issued a security advisory with the relevant patches and updates on December 3.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Any internet-accessible server running the affected React Server Components code should be assumed vulnerable until updated as a precaution.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
AWS observed that many threat actors are attempting to use public PoCs that don’t work in real-world scenarios.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
AWS noted that the use of these PoCs shows that threat actors prioritize rapid operationalization over thorough testing, attempting to exploit targets with any available tool.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Using multiple PoCs to scan for vulnerable environments also gives threat actors a higher chance of identifying vulnerable configurations, even if the PoCs are non-functional.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The availability of the PoCs also allows less sophisticated actors to participate in exploitation campaigns.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Finally, AWS noted that even failed exploitation attempts create significant noise in logs, potentially masking more sophisticated attacks.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The invalid PoCs can give developers a false sense of security when testing for React2Shell.
First reported: 08.12.2025 13:503 sources, 8 articlesShow sources
- React2Shell Under Active Exploitation by China-Nexus Hackers — www.infosecurity-magazine.com — 08.12.2025 13:50
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The Shadowserver Foundation detected 28,964 IP addresses vulnerable to the React2Shell flaw as of December 7, 2025, down from 77,664 on December 5, with approximately 10,100 located in the U.S., 3,200 in Germany, and 1,690 in China.
First reported: 08.12.2025 14:443 sources, 7 articlesShow sources
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Amazon reported attack attempts from Chinese hacking groups like Earth Lamia and Jackpot Panda within hours of public disclosure of the flaw.
First reported: 08.12.2025 14:443 sources, 8 articlesShow sources
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Coalition, Fastly, GreyNoise, VulnCheck, and Wiz have reported seeing exploitation efforts targeting the flaw, indicating that multiple threat actors are engaging in opportunistic attacks.
First reported: 08.12.2025 14:443 sources, 8 articlesShow sources
- ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More — thehackernews.com — 08.12.2025 14:44
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Huntress observed attackers targeting numerous organizations via CVE-2025-55182, with a focus on the construction and entertainment industries.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The first recorded exploitation attempt on a Windows endpoint by Huntress dates back to December 4, 2025, when an unknown threat actor exploited a vulnerable instance of Next.js to drop a shell script, followed by commands to drop a cryptocurrency miner and a Linux backdoor.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Attackers were observed launching discovery commands and attempting to download several payloads from a command-and-control (C2) server.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Huntress identified a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based post-exploitation implant referred to as ZinFoq.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
PeerBlight shares code overlaps with two malware families RotaJakiro and Pink that came to light in 2021, installs a systemd service to ensure persistence, and masquerades as a "ksoftirqd" daemon process to evade detection.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
CowTunnel initiates an outbound connection to attacker-controlled Fast Reverse Proxy (FRP) servers, effectively bypassing firewalls that are configured to only monitor inbound connections.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
ZinFoq implements a post-exploitation framework with interactive shell, file operations, network pivoting, and timestomping capabilities.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Huntress assessed that the threat actor is likely leveraging automated exploitation tooling, supported by the attempts to deploy Linux-specific payloads on Windows endpoints, indicating the automation does not differentiate between target operating systems.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
PeerBlight supports capabilities to establish communications with a hard-coded C2 server ("185.247.224[.]41:8443"), allowing it to upload/download/delete files, spawn a reverse shell, modify file permissions, run arbitrary binaries, and update itself.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
ZinFoq beacons out to its C2 server and is equipped to parse incoming instructions to run commands using "/bin/bash," enumerate directories, read or delete files, download more payloads from a specified URL, exfiltrate files and system information, start/stop SOCKS5 proxy, enable/disable TCP port forwarding, alter file access and modification times, and establish a reverse pseudo terminal (PTY) shell connection.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
ZinFoq takes steps to clear bash history and disguises itself as one of 44 legitimate Linux system services to conceal its presence.
First reported: 10.12.2025 22:193 sources, 7 articlesShow sources
- React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors — thehackernews.com — 10.12.2025 22:19
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
CISA has urged federal agencies to patch the React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation.
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The vulnerability has been exploited by multiple threat actors in various campaigns to engage in reconnaissance efforts and deliver a wide range of malware families.
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Wiz observed a "rapid wave of opportunistic exploitation" of the flaw, with a vast majority of the attacks targeting internet-facing Next.js applications and other containerized workloads running in Kubernetes and managed cloud services.
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Cloudflare reported that threat actors have conducted searches using internet-wide scanning and asset discovery platforms to find exposed systems running React and Next.js applications.
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Some of the reconnaissance efforts have excluded Chinese IP address spaces from their searches.
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The observed activity targeted government (.gov) websites, academic research institutions, and critical-infrastructure operators.
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Early scanning and exploitation attempts originated from IP addresses previously associated with Asia-affiliated threat clusters.
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Kaspersky recorded over 35,000 exploitation attempts on a single day on December 10, 2025, with the attackers first probing the system by running commands like whoami, before dropping cryptocurrency miners or botnet malware families like Mirai/Gafgyt variants and RondoDox.
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Security researcher Rakesh Krishnan discovered an open directory hosted on "154.61.77[.]105:8082" that includes a proof-of-concept (PoC) exploit script for CVE-2025–55182 along with two other files: "domains.txt," which contains a list of 35,423 domains, and "next_target.txt," which contains a list of 596 URLs, including companies like Dia Browser, Starbucks, Porsche, and Lululemon.
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The Shadowserver Foundation reported more than 137,200 internet-exposed IP addresses running vulnerable code as of December 11, 2025, with over 88,900 instances located in the U.S., followed by Germany (10,900), France (5,500), and India (3,600).
First reported: 12.12.2025 10:413 sources, 6 articlesShow sources
- React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation — thehackernews.com — 12.12.2025 10:41
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Google's threat intelligence team linked five more Chinese hacking groups to attacks exploiting the React2Shell vulnerability.
First reported: 15.12.2025 14:463 sources, 5 articlesShow sources
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The list of state-linked threat groups exploiting the flaw now also includes UNC6600, UNC6586, UNC6588, UNC6603, and UNC6595.
First reported: 15.12.2025 14:463 sources, 5 articlesShow sources
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
GTIG researchers observed numerous discussions regarding CVE-2025-55182 in underground forums, including threads where threat actors shared links to scanning tools, proof-of-concept (PoC) code, and their experiences using these tools.
First reported: 15.12.2025 14:463 sources, 5 articlesShow sources
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
GTIG also spotted Iranian threat actors targeting the flaw and financially motivated attackers deploying XMRig cryptocurrency mining software on unpatched systems.
First reported: 15.12.2025 14:463 sources, 5 articlesShow sources
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Shadowserver Internet watchdog group is currently tracking over 116,000 IP addresses vulnerable to React2Shell attacks, with over 80,000 in the United States.
First reported: 15.12.2025 14:463 sources, 5 articlesShow sources
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
GreyNoise has observed over 670 IP addresses attempting to exploit the React2Shell remote code execution flaw over the past 24 hours, primarily originating from the United States, India, France, Germany, the Netherlands, Singapore, Russia, Australia, the United Kingdom, and China.
First reported: 15.12.2025 14:463 sources, 5 articlesShow sources
- Google links more Chinese hacking groups to React2Shell attacks — www.bleepingcomputer.com — 15.12.2025 14:46
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Threat actors are exploiting the React2Shell vulnerability to deliver malware families like KSwapDoor and ZnDoor.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
KSwapDoor is a professionally engineered remote access tool designed with stealth in mind, building an internal mesh network and using military-grade encryption.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
KSwapDoor impersonates a legitimate Linux kernel swap daemon to evade detection.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
ZnDoor is a remote access trojan that contacts threat actor-controlled infrastructure to receive and execute commands.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
ZnDoor supports commands such as shell, interactive_shell, explorer, explorer_cat, explorer_delete, explorer_upload, explorer_download, system, change_timefile, socket_quick_startstreams, start_in_port_forward, and stop_in_port.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Google identified five China-nexus groups exploiting React2Shell to deliver various payloads, including MINOCAT, SNOWLIGHT, COMPOOD, HISONIC, and ANGRYREBEL.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Microsoft reported that threat actors have used the flaw to run arbitrary commands, set up reverse shells, drop RMM tools, and modify authorized_keys files.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Payloads delivered in these attacks include VShell, EtherRAT, SNOWLIGHT, ShadowPad, and XMRig.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Threat actors used Cloudflare Tunnel endpoints to evade security defenses and conducted reconnaissance for lateral movement and credential theft.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Credential harvesting targeted Azure Instance Metadata Service (IMDS) endpoints for Azure, AWS, GCP, and Tencent Cloud.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Threat actors deployed secret discovery tools such as TruffleHog and Gitleaks, along with custom scripts to extract various secrets.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Beelzebub detailed a campaign exploiting Next.js flaws to extract credentials and sensitive data, including environment files, SSH keys, cloud credentials, and system files.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The malware creates persistence, installs a SOCKS5 proxy, establishes a reverse shell, and installs a React scanner for further propagation.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Operation PCPcat has breached an estimated 59,128 servers.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The Shadowserver Foundation is tracking over 111,000 IP addresses vulnerable to React2Shell attacks, with over 77,800 instances in the U.S.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
GreyNoise observed 547 malicious IP addresses from the U.S., India, the U.K., Singapore, and the Netherlands partaking in exploitation efforts over the past 24 hours.
First reported: 16.12.2025 10:213 sources, 4 articlesShow sources
- React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors — thehackernews.com — 16.12.2025 10:21
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js servers with malware and cryptominers.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
First documented by Fortinet in July 2025, RondoDox is a large-scale botnet that targets multiple n-day flaws in global attacks.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
In November, VulnCheck spotted new RondoDox variants that featured exploits for CVE-2025-24893, a critical remote code execution (RCE) vulnerability in the XWiki Platform.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
A new report from cybersecurity company CloudSEK notes that RondoDox started scanning for vulnerable Next.js servers on December 8 and began deploying botnet clients three days later.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
React2Shell is an unauthenticated remote code execution vulnerability that can be exploited via a single HTTP request and affects all frameworks that implement the React Server Components (RSC) 'Flight' protocol, including Next.js.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The flaw has been leveraged by several threat actors to breach multiple organizations. North Korean hackers exploited React2Shell to deploy a new malware family named EtherRAT.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
As of December 30, the Shadowserver Foundation reports detecting over 94,000 internet-exposed assets vulnerable to React2Shell.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
CloudSEK says that RondoDox has passed through three distinct operational phases this year: Reconnaissance and vulnerability testing from March to April 2025, Automated web app exploitation from April to June 2025, Large-scale IoT botnet deployment from July to today.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Regarding React2Shell, the researchers report that RondoDox has focused its exploitation around the flaw significantly lately, launching over 40 exploit attempts within six days in December.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
During this operational phase, the botnet conducts hourly IoT exploitation waves targeting Linksys, Wavlink, and other consumer and enterprise routers to enroll new bots.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
After probing potentially vulnerable servers, CloudSEK says that RoundDox started to deploy payloads that included a coinminer (/nuts/poop), a botnet loader and health checker (/nuts/bolts), and a variant of Mirai (/nuts/x86).
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The 'bolts' component removes competing botnet malware from the host, enforces persistence via /etc/crontab, and kills non-whitelisted processes every 45 seconds, the researchers say.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
CloudSEK provides a set of recommendations for companies to protect against this RondoDox activity, among them auditing and patching Next.js Server Actions, isolating IoT devices into dedicated virtual LANs, and monitoring for suspicious processes being executed.
First reported: 31.12.2025 16:582 sources, 3 articlesShow sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servers — www.bleepingcomputer.com — 31.12.2025 16:58
- Google: Cloud attacks exploit flaws more than weak credentials — www.bleepingcomputer.com — 09.03.2026 23:45
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Threat actors targeting cloud environments now favor campaigns which gain initial access by exploiting software vulnerabilities over credential-based attacks.
First reported: 10.03.2026 17:301 source, 1 articleShow sources
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Third-party software-based entry accounted for 44.5% of primary entry vectors during the second half of 2025, up from 2.9% in the first half.
First reported: 10.03.2026 17:301 source, 1 articleShow sources
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Abuse of weak or absent credentials as an entry point dropped from 47.1% in the first half of 2025 to 27.2% in the second half.
First reported: 10.03.2026 17:301 source, 1 articleShow sources
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
React2Shell (CVE-2025-55182) was one of the most commonly exploited vulnerabilities to target cloud services.
First reported: 10.03.2026 17:301 source, 1 articleShow sources
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Google Cloud noted that within 48 hours of the public disclosure of React2Shell, multiple threat actors had already exploited the vulnerability to infect victims with cryptocurrency mining malware.
First reported: 10.03.2026 17:301 source, 1 articleShow sources
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
The window between vulnerability disclosure and mass exploitation collapsed from weeks to just days.
First reported: 10.03.2026 17:301 source, 1 articleShow sources
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Google Cloud recommended using centralized visibility tools to secure data and automated posture enforcement to mitigate risks.
First reported: 10.03.2026 17:301 source, 1 articleShow sources
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
-
Google Cloud advised organizations to pivot from manual patching to automated defenses, such as patching the Web Application Firewall (WAF), to neutralize exploits at the network edge before software updates can be applied.
First reported: 10.03.2026 17:301 source, 1 articleShow sources
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds — www.infosecurity-magazine.com — 10.03.2026 17:30
Similar Happenings
CISA Adds SolarWinds, Ivanti, and Workspace One Vulnerabilities to KEV Catalog
CISA has added three vulnerabilities to its KEV catalog due to evidence of active exploitation. These include CVE-2021-22054 in Omnissa Workspace One UEM, CVE-2025-26399 in SolarWinds Web Help Desk, and CVE-2026-1603 in Ivanti Endpoint Manager. The vulnerabilities are being exploited by threat actors, including the Warlock ransomware crew. Federal agencies are ordered to apply patches by March 12 and March 23, 2026. CVE-2026-1603 can be exploited by remote threat actors to bypass authentication and steal credential data in low-complexity cross-site scripting attacks that require no user interaction. Ivanti patched CVE-2026-1603 one month ago with the release of Ivanti EPM 2024 SU5, but has not received reports of exploitation prior to public disclosure.
UNC4899 Exploits AirDrop to Compromise Crypto Firm's Cloud Environment
UNC4899, a North Korean threat actor, breached a cryptocurrency firm in 2025 by exploiting an AirDrop file transfer to a developer's work device. The attackers used social engineering to deliver a trojanized file, then pivoted to the cloud environment, employing living-off-the-cloud (LOTC) techniques to steal millions in cryptocurrency. The attack involved abusing DevOps workflows, harvesting credentials, and tampering with Cloud SQL databases. The incident highlights risks associated with personal-to-corporate P2P data transfers, privileged container modes, and insecure handling of secrets in cloud environments.
AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks
A Russian-speaking, financially motivated hacker used generative AI services to breach over 600 FortiGate firewalls across 55 countries in five weeks. The campaign, which occurred between January 11 and February 18, 2026, targeted exposed management interfaces and weak credentials lacking MFA protection. The attacker used AI to automate access to other devices on breached networks, extracting sensitive configuration data and conducting reconnaissance. The attacker successfully compromised multiple organizations' Active Directory environments, extracted complete credential databases, and targeted backup infrastructure, likely in a lead-up to ransomware deployment. The threat actor used the CyberStrikeAI AI-powered security testing platform, which integrates over 100 security tools and allows for end-to-end automation of attacks. The developer of CyberStrikeAI, known as "Ed1s0nZ," has links to Chinese government-affiliated cyber operations and has worked on additional AI-assisted security tools. Team Cymru detected 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, primarily hosted in China, Singapore, and Hong Kong. Additional servers related to CyberStrikeAI have been detected in the U.S., Japan, and Switzerland. The developer has interacted with organizations supporting potentially Chinese government state-sponsored cyber operations, including Knownsec 404, a Chinese security vendor with ties to the Chinese Ministry of State Security (MSS). Ed1s0nZ has removed references to a CNNVD Level 2 Contribution Award from their GitHub profile. The campaign targeted healthcare, government, and managed service providers. The attackers exploited vulnerabilities CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858. The attackers created a new local administrator account named "support" and set up four new firewall policies allowing unrestricted access. The attackers periodically checked device accessibility, consistent with initial access broker (IAB) behavior. The attackers extracted configuration files containing encrypted service account LDAP credentials. The attackers authenticated to the AD using clear text credentials from the fortidcagent service account. The attackers enrolled rogue workstations in the AD, allowing deeper access. The attackers deployed remote access tools like Pulseway and MeshAgent. The attackers downloaded malware from a cloud storage bucket via PowerShell from AWS infrastructure. The Java malware was used to exfiltrate the contents of the NTDS.dit file and SYSTEM registry hive to an external server (172.67.196[.]232) over port 443.
TeamPCP Worm Exploits Cloud Infrastructure for Criminal Operations
TeamPCP, a threat cluster active since November 2025, has conducted a worm-driven campaign targeting cloud-native environments to build malicious infrastructure. The campaign, observed around December 25, 2025, leveraged exposed Docker APIs, Kubernetes clusters, Ray dashboards, Redis servers, and the React2Shell vulnerability (CVE-2025-55182) to compromise servers for data exfiltration, ransomware deployment, extortion, and cryptocurrency mining. The group operates as a cloud-native cybercrime platform, using misconfigured cloud services and known vulnerabilities to create a self-propagating criminal ecosystem. TeamPCP's activities include deploying various payloads such as proxy.sh, scanner.py, kube.py, react.py, and pcpcat.py to exploit and expand their reach within cloud environments. The group's operations are opportunistic, targeting AWS, Microsoft Azure, Google, and Oracle cloud environments, and have resulted in data leaks and extortion activities. The group has compromised at least 60,000 servers worldwide and has exfiltrated more than two million records from JobsGO, a recruitment platform in Vietnam.
Multiple Critical n8n Workflow Automation Vulnerabilities (CVE-2025-68613, CVE-2025-68668, CVE-2026-21877, CVE-2026-21858, CVE-2026-25049, CVE-2026-27577, CVE-2026-27493, CVE-2026-27495, CVE-2026-27497)
Multiple critical vulnerabilities in the **n8n workflow automation platform** continue to pose severe risks, with **four new flaws (CVE-2026-27577, CVE-2026-27493, CVE-2026-27495, CVE-2026-27497)** disclosed in March 2026, enabling **remote code execution (RCE), unauthenticated expression injection, and credential theft**. The latest vulnerabilities—**CVE-2026-27577 (CVSS 9.4)** and **CVE-2026-27493 (CVSS 9.5)**—allow attackers to **bypass sandbox protections** via missing AST rewriter cases and **exploit public Form nodes** to execute arbitrary commands without authentication. Successful exploitation can lead to **decryption of stored credentials (AWS keys, OAuth tokens, database passwords)** by accessing the `N8N_ENCRYPTION_KEY` environment variable, as well as **full server compromise** when chained with other flaws. These new vulnerabilities affect **over 105,000 exposed instances** globally, primarily in the U.S. and Europe, and impact both **self-hosted and cloud deployments** of n8n in versions **<1.123.22, >=2.0.0 <2.9.3, and >=2.10.0 <2.10.1**. Patches are available in **1.123.22, 2.9.3, and 2.10.1**, alongside mitigations such as disabling vulnerable nodes (Form, Merge) and restricting workflow permissions. Earlier flaws—including **CVE-2026-25049 (CVSS 9.4)**, **CVE-2026-1470 (CVSS 9.9)**, and **CVE-2026-0863 (CVSS 8.5)**—have already demonstrated risks of **sandbox escapes, AI workflow hijacking, and exposure of sensitive credentials**. Users are urged to **upgrade immediately**, audit workflows for suspicious expressions, and harden deployment environments to mitigate critical risks.