Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Hackers Exploiting React2Shell Vulnerability

Posted on December 5, 2025December 5, 2025 By CWS

Risk actors have apparently began exploiting the newly disclosed React vulnerability tracked as React2Shell and CVE-2025-55182.

The crucial vulnerability may be exploited utilizing specifically crafted HTTP requests for unauthenticated distant code execution on affected servers. It was reported to React maintainer Meta on November 29 by researcher Lachlan Davidson, and it was patched on December 3.

React2Shell could influence many techniques contemplating that React, an open supply JavaScript library designed for creating software person interfaces, powers thousands and thousands of internet sites and its related NPM bundle has thousands and thousands of weekly downloads. Cloud safety big Wiz reported that 39% of cloud environments comprise susceptible React cases. 

Davidson has arrange a devoted React2Shell web site, however has not made public the technical particulars of the vulnerability. Nonetheless, risk actors and researchers have been reverse-engineering the patches.

A number of proof-of-concept (PoC) exploits have been made public shortly after React2Shell’s disclosure, however they turned out to be faux. Nonetheless, there seems to be at the least one public PoC exploit that works.

Unsurprisingly, exploitation makes an attempt have additionally been seen. AWS reported late on Thursday that its risk intelligence groups began seeing CVE-2025-55182 exploitation makes an attempt by China-linked risk actors inside hours of public disclosure. 

AWS famous that whereas exact attribution is difficult because of the sharing of assault infrastructure, it believes assault makes an attempt have been carried out by the teams referred to as Earth Lamia and Jackpot Panda. 

Earth Lamia has been energetic since at the least 2023, concentrating on a variety of industries in Latin America, the Center East, and Southeast Asia. The risk actor has been noticed exploiting a number of vulnerabilities in its assaults.Commercial. Scroll to proceed studying.

Jackpot Panda has been round since at the least 2020, conducting cyberespionage operations in Asia.

“Risk actors are utilizing each automated scanning instruments and particular person PoC exploits,” AWS stated.

Dan Andrew, head of safety at Intruder, advised SecurityWeek that they’ve additionally witnessed exploitation exercise for React2Shell.

Scanning and faux PoC exploits

CVE-2025-55182 has additionally been added to vulnerability scanners and offensive safety instruments that may detect susceptible cases, which might result in much more widespread exploitation makes an attempt.

Then again, safety researcher Kevin Beaumont identified that the vulnerability solely impacts React model 19, particularly cases that use a comparatively new server characteristic. 

As Beaumont identified, a few of these exploitation makes an attempt seem to leverage faux PoCs.

AWS confirmed that some risk actors are trying to make use of the faux PoCs, which don’t work in real-world situations, indicating that they’re desperately making an attempt to use the vulnerability as shortly as doable.

Nonetheless, AWS has additionally seen risk actors systematically troubleshooting their exploitation makes an attempt.

“This conduct demonstrates that risk actors aren’t simply working automated scans, however are actively debugging and refining their exploitation strategies towards reside targets,” AWS defined. 

The cloud firm has made out there indicators of compromise (IoCs) to assist organizations detect potential exploitation makes an attempt.

Associated: Microsoft Silently Mitigated Exploited LNK Vulnerability

Associated: Reporters With out Borders Focused by Russian Hackers

Security Week News Tags:Chinese, Exploiting, Hackers, React2Shell, Vulnerability

Post navigation

Previous Post: JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
Next Post: Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer

Related Posts

UK Train Operator LNER Warns Customers of Data Breach Security Week News
NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms Security Week News
Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Security Week News
SolarWinds Patches Three Critical Serv-U Vulnerabilities Security Week News
Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience Security Week News
SonicWall Updates SMA 100 Appliances to Remove Overstep Malware Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark