Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Over 644,000 Domains Exposed to Critical React Server Components Vulnerability

Over 644,000 Domains Exposed to Critical React Server Components Vulnerability

Posted on December 10, 2025December 11, 2025 By CWS

The Shadowserver Basis has launched alarming new knowledge relating to the publicity of net purposes to CVE-2025-55182, a important vulnerability affecting React Server Elements.

Following vital enhancements to their scanning methodologies, researchers have recognized a large assault floor comprising over 165,000 distinctive IP addresses and greater than 644,000 domains internet hosting susceptible code as of December 8, 2025.

This surge in recognized situations means that earlier estimates of the vulnerability’s attain had been considerably understated. The improved focusing on capabilities deployed by Shadowserver have enabled deeper inspection of net infrastructure, revealing that a whole lot of hundreds of internet sites are at the moment prone to exploitation.

CVE-2025-55182 targets the structure of React Server Elements, probably permitting attackers to bypass safety controls or execute unauthorized code on the server aspect if left unpatched.

Widespread Publicity Detected

The sheer quantity of affected domains highlights the pervasive nature of React in trendy net improvement. As a result of React Server Elements are sometimes integral to the rendering pipeline of high-performance net purposes, a vulnerability at this layer poses extreme dangers to knowledge integrity and server safety.

The information signifies that the problem will not be remoted to a particular area or sector however impacts a broad spectrum of the web, from small enterprise websites to enterprise-grade platforms.

Safety specialists are urging directors to prioritize this patch instantly. The invention that over half 1,000,000 domains are uncovered creates a profitable goal setting for risk actors, who typically automate assaults as soon as a Proof of Idea (PoC) turns into accessible or scanning methods are refined.

The up to date statistics from Shadowserver are a important warning that the remediation window is closing quickly.

Organizations using React Server Elements of their expertise stack should confirm their present variations towards vendor advisories instantly.

The Shadowserver Basis has supplied a public dashboard to trace the statistics of those susceptible situations, encouraging transparency and speedy response throughout the cybersecurity group.

Directors ought to test their logs for indicators of compromise, because the vulnerability might have been current for a while earlier than these enhanced scans detected the total scope of publicity.

CVE IDCVSS ScoreAffected ComponentImpactVulnerable IPsCVE-2025-551829.8 (Vital)React Server ComponentsRCE / Safety Bypass> 165,000

Making use of the official patches launched by the React maintainers is the one definitive option to mitigate the danger. Till patches are utilized, these 644,000 domains stay open doorways for potential cyberattacks.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Components, Critical, Domains, Exposed, React, Server, Vulnerability

Post navigation

Previous Post: New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks
Next Post: Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS

Related Posts

Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Cyber Security News
Python-powered Toolkit for Information Gathering and reconnaissance Python-powered Toolkit for Information Gathering and reconnaissance Cyber Security News
Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure Cyber Security News
SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials Cyber Security News
Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency Cyber Security News
OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News