Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182)

Posted on December 5, 2025December 5, 2025 By CWS

A proof-of-concept (PoC) exploit for CVE-2025-55182, a maximum-severity distant code execution (RCE) flaw in React Server Elements, surfaced publicly this week, heightening alarms for builders worldwide.

Dubbed “React2Shell” by some researchers, the vulnerability carries a CVSS rating of 10.0 and impacts React variations 19.0.0 via 19.2.0, in addition to Subsequent.js 15.x and 16.x utilizing App Router. Even functions not explicitly implementing server features stay uncovered in the event that they help React Server Elements (RSC).​

Safety researcher @maple3142 demonstrated the exploit through a Twitter submit, showcasing a easy multipart HTTP request that injects a Node.js payload.

The demo triggers little one course of, popping open a Linux calculator on the goal server with out authentication.

An accompanying video captures a curl-like command exploiting the flaw via React’s Flight protocol, bypassing serialization safeguards with strategies like Blob references labeled “$B1337.” Framed as a CTF-style “JS jail” problem, the shared gist drew reward from the group alongside questions on evasion strategies.​

The basis trigger lies in insecure deserialization throughout the RSC Flight protocol, the place malformed payloads pollute object prototypes and hijack server-side execution.

Found by Lachlan Davidson and responsibly disclosed to Meta and Vercel on November 29, the problem went public on December 3, prompting swift patches.

A brand new scanner device was additionally launched to determine susceptible endpoints on the community for CVE-2025-55182.

Amazon risk intelligence reported exploitation makes an attempt by China-nexus teams like Earth Lamia inside hours of disclosure. Wiz Analysis estimates 39% of cloud environments host susceptible cases, scanning over 968,000 servers.​

Palo Alto Networks Unit 42 and others confirmed the assault requires solely a crafted POST request to RSC endpoints, attaining near-100% reliability in exams. React’s official advisory urges instant upgrades, noting the flaw persists in default configurations of common frameworks.​

Builders ought to audit deployments, apply patches from React 19.2.1+ and Subsequent.js updates, and monitor for anomalies.

Whereas no widespread breaches are confirmed but, the PoC’s simplicity amplifies dangers in manufacturing environments. This incident underscores the perils of server-side rendering in fashionable JavaScript stacks.​

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Critical, CVE202555182, Exploit, Next.js, PoC, RCE, React, Released, Vulnerability

Post navigation

Previous Post: India Rolls Back Order to Preinstall Cybersecurity App on Smartphones
Next Post: China-Nexus Hackers Actively Exploiting React2Shell Vulnerability in The Wild

Related Posts

SolarWinds Releases Advisory on Salesloft Drift Security Incident Cyber Security News
AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness Cyber Security News
Predator Spyware Compamy Used 15 Zero-Days Since 2021 to Target iOS Users Cyber Security News
NVIDIA Triton Vulnerability Let Attackers Trigger DoS Attack Using Malicious Payload Cyber Security News
Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users Cyber Security News
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark