Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

China-Nexus Hackers Actively Exploiting React2Shell Vulnerability in The Wild

Posted on December 5, 2025December 5, 2025 By CWS

China-nexus menace teams are racing to weaponize the brand new React2Shell bug, tracked as CVE-2025-55182, solely hours after its public disclosure.

The flaw sits in React Server Parts and lets an attacker run code on the server with out logging in. Early scans present broad probing of internet-facing React and Subsequent[.]js apps, with a deal with high-value cloud workloads.

The bug hits React 19.x and Subsequent[.]js 15.x and 16.x when the App Router characteristic is in use. Even apps that don’t name server actions are in danger so long as they help React Server Parts.

This makes the publicity giant for groups which have adopted the newest React stack however haven’t but patched.

AWS safety analysts and researchers recognized stay React2Shell exploit site visitors of their MadPot honeypot community inside hours of the advisory going public.

They then pushed new defenses by means of Sonaris and up to date AWS WAF managed guidelines, whereas warning that these layers don’t change quick patching on customer-run EC2, containers, and on-prem hosts.

Visitors linked to China-nexus teams similar to Earth Lamia and Jackpot Panda exhibits lively testing of public proof-of-concept code in opposition to actual apps.

Some clusters spend near an hour fine-tuning payloads, making an attempt instructions like whoami, id, file writes to /tmp/’pwned’.txt, and reads of /and so on/’passwd’.

FieldDetailCVECVE-2025-55182NameReact2ShellCWE / ClassUnsafe deserialization in React Server ComponentsSeverity (CVSS)10.0, criticalAffected stackReact 19.x; Subsequent.js 15.x, 16.x with App RouterAttack vectorRemote, unauthenticated HTTP POSTImpactRemote code execution on the Node.js serverKey HTTP indicators‘next-action‘, ‘rsc-action-id‘, ‘$”@‘, “standing”:”resolved_model”

An infection circulation and exploit chain

This part provides a whole technical breakdown in clear, easy phrases. A typical React2Shell assault begins with a crafted POST request to a React Server Parts endpoint.

The physique holds a pretend “motion” payload that abuses the unsafe deserialize step to inject JavaScript on the server.

A easy instance seems to be like this:-

‘POST /_rsc HTTP/1[.]1’
Host: sufferer[.]instance
Content material-Kind: utility/json

{“next-action”:”‘$@’malicious_payload”,”standing”:”resolved_model”}

As soon as the payload lands, the server might spawn shell instructions, contact recordsdata in / ‘tmp‘, or open new outbound connections from the Node course of.

Many public exploits are damaged, however attackers nonetheless fireplace them at scale, filling logs with noise and hiding working chains.

Groups ought to hunt for these headers and patterns, plus odd little one processes from Node[.]js; this highlights these indicators for quick assessment by incident responders.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actively, ChinaNexus, Exploiting, Hackers, React2Shell, Vulnerability, Wild

Post navigation

Previous Post: PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182)
Next Post: New Stealthy Linux Malware Combines Mirai-Derived DDoS Botnet and Fileless Cryptominer

Related Posts

Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents Cyber Security News
Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules Cyber Security News
Apache Struts Vulnerability Let Attackers Trigger Disk Exhaustion Attacks Cyber Security News
Guided Selling in 3D Product Configurators Cyber Security News
DHS Asks OpenAI To Share Information on ChatGPT Prompts Used By Users Cyber Security News
72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Days Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark