Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical React2Shell Flaw Exploited in Major Cyberattack

Critical React2Shell Flaw Exploited in Major Cyberattack

Posted on April 7, 2026 By CWS

A critical flaw known as React2Shell has put numerous web applications at risk as hackers exploit this vulnerability in websites using the Next.js framework. Within a mere 24 hours, a staggering 766 hosts were compromised, leading to the theft of valuable credentials such as passwords and cloud access keys.

Understanding the React2Shell Vulnerability

The issue involves CVE-2025-55182, commonly referred to as React2Shell, which has been given a maximum severity score of 10.0 on the CVSS scale. This vulnerability is found in the React Server Components (RSC) Flight protocol and specifically affects how HTTP requests to Server Function endpoints are processed. A single malicious HTTP request can allow attackers to execute code on the server without needing authentication.

In addition to CVE-2025-55182, Next.js itself has been assigned a separate tracking number, CVE-2025-66478, due to the extensive exposure it faces from this flaw. Cisco Talos researchers have linked this attack to a threat group they are monitoring as UAT-10608.

Impact and Methodology of the Attack

The attack campaign is both organized and widespread. Attackers utilize services like Shodan and Censys to identify vulnerable Next.js deployments globally. Once a susceptible target is identified, the exploit is automated, requiring no further human intervention after initiation.

The attack’s impact spans across various regions and cloud platforms, including AWS, Google Cloud, and Microsoft Azure. In just 24 hours, 766 hosts were confirmed compromised, resulting in the theft of over 10,120 files. These included sensitive credentials such as SSH keys, database passwords, and cloud access tokens.

The campaign has significant implications for supply chain security. Breached hosts exposed authentication files for package registries, posing a threat if malicious software versions are distributed.

NEXUS Listener: Managing Stolen Data

To handle the vast amount of data collected, UAT-10608 employs a custom command-and-control system called NEXUS Listener. This platform, currently in its third iteration, offers a user-friendly interface for operators to manage compromised credentials and analyze attack statistics.

The attack begins when a vulnerable endpoint is discovered, and a crafted HTTP request is sent, triggering the server to execute arbitrary code. A lightweight script is deployed to retrieve further scripts for credential harvesting, which report back to the NEXUS Listener server.

Organizations using Next.js with the App Router or React Server Components are urged to update to the latest patches immediately. All potentially compromised credentials should be rotated, and security teams are advised to audit for permissive roles and monitor unusual outbound traffic to prevent further breaches.

Stay informed by following us on Google News, LinkedIn, and X for the latest updates. Set CSN as your preferred source on Google to receive more insights on cybersecurity threats.

Cyber Security News Tags:Cisco Talos, cloud security, CVE-2025-55182, CVE-2025-66478, Cyberattack, Cybersecurity, data breach, data security, Hacking, Next.js, NEXUS Listener, React2Shell, supply chain threat, Vulnerability

Post navigation

Previous Post: Claude Mythos: A Revolutionary AI Model with Cybersecurity Implications
Next Post: Why Automated Pentesting Needs a Broader Approach

Related Posts

United Natural Foods Suffers Cyberattack United Natural Foods Suffers Cyberattack Cyber Security News
CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks Cyber Security News
Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach Cyber Security News
Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat Cyber Security News
Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach Cyber Security News
North Korean Hackers use Code Abuse Tactics for ‘Contagious Interview’ Campaign North Korean Hackers use Code Abuse Tactics for ‘Contagious Interview’ Campaign Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kubernetes Misconfigurations Enable Dangerous Cloud Exploits
  • BPFDoor Variants Evade Detection Using Stateless C2
  • BlueHammer Exploit Affects Windows Defender Security
  • Why Automated Pentesting Needs a Broader Approach
  • Critical React2Shell Flaw Exploited in Major Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kubernetes Misconfigurations Enable Dangerous Cloud Exploits
  • BPFDoor Variants Evade Detection Using Stateless C2
  • BlueHammer Exploit Affects Windows Defender Security
  • Why Automated Pentesting Needs a Broader Approach
  • Critical React2Shell Flaw Exploited in Major Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark