Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Posted on December 6, 2025December 6, 2025 By CWS

A vital unauthenticated distant code execution vulnerability dubbed “React2Shell” is actively being exploited within the wild, placing hundreds of thousands of internet providers in danger.

On December 3, React disclosed CVE-2025-55182, a vital flaw in React Server Elements with a CVSS rating of 10.

The vulnerability stems from insecure deserialization throughout the “Flight” protocol utilized by React Server Elements.

Attackers can execute arbitrary code on susceptible servers by sending specifically crafted HTTP requests to Server Perform endpoints with out requiring authentication. This enables risk actors to realize full management of affected programs.

Amazon Internet Providers researchers reported that China-nexus risk actors, together with Earth Lamia and Jackpot Panda, started exploiting this vulnerability inside 24 hours of its public disclosure.

The attackers are concentrating on susceptible cloud-hosted functions utilizing React Server Elements. Typically, they deploy internet shells and backdoors shortly after gaining preliminary entry.

FieldDetailsCVE-IDCVE-2025-55182CVSS Score10.0 (Crucial)Vulnerability TypeUnauthenticated Distant Code ExecutionAffected VersionsReact 19.0.0, 19.1.0, 19.1.1, 19.2.0

As of December 5, CISA added CVE-2025-55182 to its Recognized Exploited Vulnerabilities Catalog, underscoring the severity and lively exploitation of this flaw.

GreyNoise has additionally documented opportunistic exploitation makes an attempt in opposition to their honeypots, indicating widespread scanning and exploitation exercise throughout the web.

In line with Censys, roughly 2.15 million internet-facing internet providers could also be affected by this vulnerability.

These embody uncovered providers operating React Server Elements and affected frameworks equivalent to Subsequent.js, Waku, React Router, and RedwoodSDK.

Whereas this depend displays software program publicity reasonably than confirmed susceptible variations, the size of potential affect is critical given the recognition of those frameworks.

The vulnerability impacts React Server Elements packages, together with react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack, in variations 19.0.0 by 19.2.0.

A number of widespread frameworks rely upon these packages, together with Subsequent.js variations 14.3.0-canary.77 and above when utilizing App Router, React Router RSC preview, Waku, Vite RSC Plugin, Parcel RSC Plugin, and RedwoodSDK.

Pure client-side React functions that don’t run server-side parts usually are not affected.

Nevertheless, functions implementing React Server Elements stay susceptible even when they don’t explicitly use Server Perform endpoints.

Mounted variations are actually accessible. Organizations ought to instantly replace to React 19.0.1, 19.1.2, or 19.2.1.

Subsequent.js customers ought to improve to variations 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, or 16.0.7 relying on their present model.

Whereas WAF suppliers, together with Cloudflare and AWS, have deployed protecting rule units, some proof-of-concept exploits reveal bypass methods. Patching stays probably the most dependable mitigation technique.

Given the lively exploitation, most severity rating, and widespread framework adoption, organizations operating React Server Elements ought to deal with this as an emergency patch precedence.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:2.15M, Active, Exploitation, Exposed, Internet, Next.js, Patch, Running, Services, Underway, Web

Post navigation

Previous Post: Avast Antivirus Sandbox Vulnerabilities Let Attackers Escalate Privileges
Next Post: Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions

Related Posts

Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User Cyber Security News
25 Controls, Mapped And Audit-Ready Cyber Security News
Hackers Using Leverage Tuoni C2 Framework Tool to Stealthily Deliver In-Memory Payloads Cyber Security News
Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics Cyber Security News
Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors Cyber Security News
Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark