
A important vulnerability in React Server Parts is being actively exploited by a number of menace teams, placing 1000’s of internet sites — together with crypto platforms — at rapid threat with customers presumably seeing all their property drained, if impacted.
The flaw, tracked as CVE-2025-55182 and nicknamed React2Shell, permits attackers to execute code remotely on affected servers with out authentication. React’s maintainers disclosed the difficulty on Dec. 3 and assigned it the best doable severity rating.
Shortly after disclosure, GTIG noticed widespread exploitation by each financially motivated criminals and suspected state-backed hacking teams, focusing on unpatched React and Subsequent.js functions throughout cloud environments.
Loading…
What the vulnerability does
React Server Parts are used to run elements of an internet software instantly on a server as a substitute of in a person’s browser. The vulnerability stems from how React decodes incoming requests to those server-side capabilities.
In easy phrases, attackers can ship a specifically crafted net request that methods the server into operating arbitrary instructions, or successfully handing over management of the system to the attacker.
The bug impacts React variations 19.0 by means of 19.2.0, together with packages utilized by common frameworks equivalent to Subsequent.js. Merely having the weak packages put in is commonly sufficient to permit exploitation.
How attackers are utilizing it
The Google Menace Intelligence Group (GTIG) documented a number of energetic campaigns utilizing the flaw to deploy malware, backdoors and crypto-mining software program.
Some attackers started exploiting the flaw inside days of disclosure to put in Monero mining software program. These assaults quietly devour server assets and electrical energy, producing earnings for attackers whereas degrading system efficiency for victims.
Crypto platforms rely closely on fashionable JavaScript frameworks equivalent to React and Subsequent.js, typically dealing with pockets interactions, transaction signing and allow approvals by means of front-end code.
If an internet site is compromised, attackers can inject malicious scripts that intercept pockets interactions or redirect transactions to their very own wallets— even when the underlying blockchain protocol stays safe.
That makes front-end vulnerabilities significantly harmful for customers who signal transactions by means of browser wallets.


