Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cloudflare Outage Traced to Emergency React2Shell Patch Deployment

Cloudflare Outage Traced to Emergency React2Shell Patch Deployment

Posted on December 5, 2025December 5, 2025 By CWS

Cloudflare’s international community suffered a quick however widespread disruption this morning, lasting roughly 25 minutes, resulting from an inner change in its Internet Software Firewall (WAF) designed to counter a crucial vulnerability in React Server Parts.

The incident, which started round 8:47 GMT, affected the Cloudflare Dashboard, APIs, and proxied providers, inflicting 500 Inside Server Errors for numerous web sites worldwide, together with high-profile platforms like Coinbase, Claude AI by Anthropic, Zerodha, and Groww.​

Cloudflare’s standing web page confirmed the outage stemmed from modifications to how the WAF parses incoming requests, applied urgently to mitigate CVE-2025-55182, a maximum-severity (CVSS 10.0) distant code execution (RCE) flaw dubbed “React2Shell.”

Disclosed on December 3, this vulnerability exploits insecure deserialization in React’s Server Parts “Flight” protocol, enabling unauthenticated attackers to execute arbitrary code through malicious HTTP requests to server operate endpoints.

Affected variations embrace React 19.0 by way of 19.2.0, plus frameworks like Subsequent.js (15.x-16.x), React Router, and others equivalent to Waku and RedwoodSDK.​

The patch deployment backfired momentarily, rendering Cloudflare’s community unavailable earlier than engineers rolled it again and restored providers by 9:20 UTC.

“This was not an assault; the change was deployed by our workforce to assist mitigate the industry-wide vulnerability,” the corporate said in updates posted all through the morning.

Cloudflare had proactively deployed WAF guidelines on December 2 to dam exploits, mechanically shielding proxied visitors for all clients, together with free plans. No exploit makes an attempt had been detected through these guidelines previous to the outage.​

React2Shell has already drawn real-world consideration, with AWS reporting exploitation by China-linked teams like Earth Lamia and Jackpot Panda inside hours of disclosure.

Proof-of-concept exploits flow into extensively, prompting pressing patch suggestions for React 19.2.1 and up to date Subsequent.js variations. Rapid7 and others warn that even apps with out specific server features stay in danger if supporting React Server Parts.​

This marks Cloudflare’s second main hiccup in weeks, following a November 18 outage from Bot Administration bugs and a June incident impacting Zero Belief providers.

CEO Matthew Prince beforehand known as the prior occasion the “worst since 2019.” Cloudflare assures full restoration and ongoing monitoring, urging React customers to replace instantly.​

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Cloudflare, Deployment, Emergency, Outage, Patch, React2Shell, Traced

Post navigation

Previous Post: AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2
Next Post: In Other News: X Fined €120 Million, Array Flaw Exploited, New Iranian Backdoor

Related Posts

Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details Cyber Security News
Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds Cyber Security News
New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages Cyber Security News
Breaking Down Silos Aligning IT and Security Teams Breaking Down Silos Aligning IT and Security Teams Cyber Security News
HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark