Active Exploitation of Critical Vulnerability in React Server Components (RSC)

Information:
React is a JavaScript library used for building websites and web applications. It helps divide the user interface into smaller reusable parts called components, making development and maintenance easier. React primarily operates on the client side and updates the user interface efficiently without requiring full page reloads. It can work together with other tools and frameworks, such as Next.js. Today, React is widely used in both small-scale and large-scale web applications.
Incident:
Widespread attacks have been detected targeting applications developed with React 19 and Next.js, particularly systems that have React Server Components (RSC) enabled. This vulnerability has been classified with the highest severity level (Critical), with details as follows:
The vulnerability CVE-2025-55182 (React2Shell) originates from a flaw in the React Flight protocol, which is responsible for handling the serialization and deserialization of objects between the server and client. The core issue lies in insufficient type validation performed by the server-side parser during the deserialization process. As a result, an attacker can send a crafted HTTP POST request containing a malicious object with embedded system commands. When the server processes this payload, it can immediately lead to remote code execution (RCE) without requiring any authentication (pre-authentication).
Based on threat intelligence monitoring, this vulnerability has been actively exploited in the wild by malicious actors across multiple attack scenarios, as detailed below.
APT groups and cybercriminals have leveraged this vulnerability as an initial access vector to deploy EtherRAT malware, enabling remote system control and command execution. The attackers further expanded their access laterally across the internal network to reach critical systems and sensitive databases within the organization.
Cloud system attacks have been observed involving attempts to read environment variables in order to steal cloud access keys (such as AWS, Azure, and GCP credentials), posing a high risk of large-scale compromise and takeover of the organization’s cloud infrastructure.
Cryptocurrency mining malware deployment has been observed, where automated scripts scan for vulnerable servers and install XMRig (cryptominer), resulting in excessive consumption of server resources and degradation of overall system performance.
Recommendation:
- Verify and immediately update affected libraries to patched versions(React 19.0.3+,
Next.js 15.0.7+).
- Configure a Web Application Firewall (WAF) with rules to detect and block abnormal HTTP requests, particularly malformed payloads in the request body targeting the RSC protocol.
- Monitor and investigate processes exhibiting abnormal resource consumption, such as sustained high CPU usage.
- Scan systems for Indicators of Compromise (IoCs) associated with EtherRAT and XMRig.
- Remove any unauthorized files or suspicious scheduled tasks from affected systems.
The important things is Security systems. We must concern and monitor as usual.
For more information please contact
Email :sales@inetms.co.th
065 149 2822 (Ms.Suphatson )
063 204 4534 (Ms.Atsamaphorn)
065 929 6330 (Ms.Kansinee)
061 387 9439 (Ms.Sirilak)
092 257 6902 (Ms.Narusorn)
063 197 7510 (Mr.Yanotai)
065 725 7405 (Ms.Nattharini)
References :
- https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025- 55182-react2shell-vulnerability-in-react-server-components/
- https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server- components
Weekly Interesting CVE
| NO. |
CVE Name |
Published Date |
Last Update |
Device/Appplication/OS Target |
Attack Type |
CVSS |
Detail |
Solution |
Reference |
|---|---|---|---|---|---|---|---|---|---|
| 1 |
CVE-2025-55182 |
3/12/2025 |
6/12/2025 |
React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 |
Execute code |
10.0 |
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints. |
Update to the patched version if your project uses packages in the react-server-dom-* family (e.g., webpack, turbopack, or parcel), as follows: |
https://www.cvedetails.com/cve/CVE-2025-55182/
|
| 2 |
CVE-2025-34319 |
3/12/2025 |
4/12/2025 |
TOTOLINK N300RT wireless router |
OS command injection |
9.3 |
TOTOLINK N300RT wireless router firmware versions prior to V3.4.0-B20250430 (discovered in V2.1.8-B20201030.1539) contain an OS command injection vulnerability in the Boa formWsc handling functionality. An unauthenticated attacker can send specially crafted requests to trigger command execution via the targetAPSsid request parameter. |
Since the manufacturer released the latest firmware in 2020, indicating that support for this device may have already been discontinued, users should consider replacing the device to ensure security. |
|
| 3 |
CVE-2025-14174 |
12/12/2025 |
12/12/2025 |
Google Chrome on MacOS |
Out-of-Bounds |
8.8 |
Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page |
Upgrade to version 143.0.7499.110 or later |
|
| 4 |
CVE-2025-13720 |
2/12/2025 |
4/12/2025 |
Google Chrome prior to 143.0.7499.41 |
Incorrect Type Conversion or Cast |
8.8 |
Bad cast in Loader in Google Chrome prior to 143.0.7499.41 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) |
Upgrade to version 143.0.7499.41 or later |
|
| 5 |
CVE-2025-64785 |
12/9/2025 |
12/12/2025 |
Adobe Acrobat Reader versions |
Untrusted Search Path |
8.4 |
Acrobat Reader are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. |
Upgrade to 20.005.30838 |
https://nvd.nist.gov/vuln/detail/CVE-2025-64785 |
Malware News or Campaign IOC/IOA | EN
|
No |
Campaign Name |
Detection Date |
Attack Type |
Description |
Mitigation/Remediation |
|---|---|---|---|---|---|
| 1 |
CyberVolk’s ransomware debut stumbles on cryptography weakness |
13/12/2025 |
ransomware-as-a-service (RaaS) |
SentinelOne researchers discovered CyberVolk ransomware from a pro-Russian hacktivist group that uses a ransomware-as-a-service (RaaS) model. This ransomware was found to have a flaw that allows it to be decrypted simply by tracing the key within the binary written in plaintext on the machine. This enables victims to decrypt the malware for free without having to pay the criminals.The Pro Russia Hacktivist group, based in India, targets both government and private sectors opposed to Russia, focusing on devices using Linux/VMware ESXi and Windows operating systems. |
|
Ref: https://www.bleepingcomputer.com/news/security/cybervolks-ransomware-debut-stumbles-on-cryptography-weakness/
23 December 2025
Viewed 133 time