top of page
perceptive_background_267k.jpg

React2Shell flaw (CVE-2025-55182) exploited for remote code execution

Published:

11 December 2025 at 18:07:12

Alert date:

11 December 2025 at 19:01:12

Source:

news.sophos.com

Click to open the original link from this advisory

Web Technologies, Zero-Day Vulnerabilities, Ransomware & Malware, Supply Chain & Dependencies

The React2Shell vulnerability (CVE-2025-55182) is being actively exploited for remote code execution attacks. The flaw allows attackers to execute arbitrary code remotely on affected systems. Security researchers have identified exploit code that is publicly available, which increases the risk of widespread opportunistic attacks. Organizations using React2Shell should prioritize patching this critical vulnerability. The availability of working exploits makes this a high-priority security concern for defenders.

Technical details

React2Shell is a flaw in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 that affects how data sent from browser to server is handled via the React 'Flight' protocol. The vulnerability is caused by unsafe handling of incoming data during deserialization when server converts network requests into JavaScript objects. Due to insufficient validation, attackers can send specially crafted requests that bypass expected format validation, allowing interference with application code execution. Attackers can exploit this to execute arbitrary JavaScript with application privileges by sending a single malicious HTTP request without requiring authentication or credentials.

Mitigation steps:

Organizations operating internet-facing React infrastructure should prioritize patching CVE-2025-55182 immediately. Monitor for suspicious post-exploitation activity including rapid deployment of Linux loaders, persistence mechanisms via systemd/cron/rc.local, covert Node.js installations in hidden directories, network discovery activities, and exfiltration beacons. Use provided Sophos detections (Linux/DldrYI, Linux/AgntGA, Linux/AgntFZ, Linux/AgntGB, Linux/AgntGC, Linux/DldrYG) and monitor for the provided threat indicators.

Affected products:

React Server Components 19.0.0
React Server Components 19.1.0
React Server Components 19.1.1
React Server Components 19.2.0
Next.js (indirectly affected)

Related links:

Related CVE's:

Related threat actors:

IOC's:

gfdsgsdfhfsd_ghsfdgsfdgsdfg.sh, 011a62df99e52c8b73e259284ab1db47, c3924fc5a90b6120c811eb716a25c168c72db0ba, fb3a6bdf98d5010350c04b2712c2c8357e079dec2d2a848d0dc2def2bafcc984, tsd.sh, 3ba7c58df9b6d21c04eaa822738291b60c65b7c8, init.sh, 88af4a140ec63a15edc17888a08a76b2, da33bda52e9360606102693d68316f4ec1be673e, 5a6fdcb5cf815ce065ee585a210c19d1c9efb45c293476554bf1516cc12a1bab, b.sh, 1e54a769e692a69d74f598e0b1fdb2949f242de3, hybird-accesskey-staging-saas[.]s3[.]dualstack[.]ap-northeast-1[.]amazonaws[.]com/agent, 194[.]38[.]11[.]3:1790, webhook[.]site, /usr/infju/system_os, /etc/cron.hourly/tsd, /var/log/system_os_management.log

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page