Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 644,000 Domains Exposed to Critical React Server Components Vulnerability

Posted on December 10, 2025December 11, 2025 By CWS

The Shadowserver Basis has launched alarming new knowledge relating to the publicity of net purposes to CVE-2025-55182, a important vulnerability affecting React Server Elements.

Following vital enhancements to their scanning methodologies, researchers have recognized a large assault floor comprising over 165,000 distinctive IP addresses and greater than 644,000 domains internet hosting susceptible code as of December 8, 2025.

This surge in recognized situations means that earlier estimates of the vulnerability’s attain had been considerably understated. The improved focusing on capabilities deployed by Shadowserver have enabled deeper inspection of net infrastructure, revealing that a whole lot of hundreds of internet sites are at the moment prone to exploitation.

CVE-2025-55182 targets the structure of React Server Elements, probably permitting attackers to bypass safety controls or execute unauthorized code on the server aspect if left unpatched.

Widespread Publicity Detected

The sheer quantity of affected domains highlights the pervasive nature of React in trendy net improvement. As a result of React Server Elements are sometimes integral to the rendering pipeline of high-performance net purposes, a vulnerability at this layer poses extreme dangers to knowledge integrity and server safety.

The information signifies that the problem will not be remoted to a particular area or sector however impacts a broad spectrum of the web, from small enterprise websites to enterprise-grade platforms.

Safety specialists are urging directors to prioritize this patch instantly. The invention that over half 1,000,000 domains are uncovered creates a profitable goal setting for risk actors, who typically automate assaults as soon as a Proof of Idea (PoC) turns into accessible or scanning methods are refined.

The up to date statistics from Shadowserver are a important warning that the remediation window is closing quickly.

Organizations using React Server Elements of their expertise stack should confirm their present variations towards vendor advisories instantly.

The Shadowserver Basis has supplied a public dashboard to trace the statistics of those susceptible situations, encouraging transparency and speedy response throughout the cybersecurity group.

Directors ought to test their logs for indicators of compromise, because the vulnerability might have been current for a while earlier than these enhanced scans detected the total scope of publicity.

CVE IDCVSS ScoreAffected ComponentImpactVulnerable IPsCVE-2025-551829.8 (Vital)React Server ComponentsRCE / Safety Bypass> 165,000

Making use of the official patches launched by the React maintainers is the one definitive option to mitigate the danger. Till patches are utilized, these 644,000 domains stay open doorways for potential cyberattacks.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Components, Critical, Domains, Exposed, React, Server, Vulnerability

Post navigation

Previous Post: New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks
Next Post: Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS

Related Posts

Microsoft Azure Faces Global Outage Affecting Services Worldwide Cyber Security News
Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack Cyber Security News
Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Cyber Security News
Critical Open Source Easyjson Library Under Full Control of Russian Company Cyber Security News
WordPress Theme RCE Vulnerability Actively Exploited to Take Full Site Control Cyber Security News
What is ClickFix Attack – How Hackers are Using it to Attack User Device With Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
  • .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
  • Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS
  • Over 644,000 Domains Exposed to Critical React Server Components Vulnerability
  • New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
  • .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
  • Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS
  • Over 644,000 Domains Exposed to Critical React Server Components Vulnerability
  • New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark