Skip to main content
Mallory

Exploitation of React2Shell Vulnerability by Botnets and Threat Actors

proof-of-concept-releaserapid-weaponizationactively-exploited-vulnerabilityopen-source-dependency-vulnerabilitydetection-content-update
Updated March 21, 2026 at 02:56 PM2 sources
Share:
Exploitation of React2Shell Vulnerability by Botnets and Threat Actors

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A critical unauthenticated remote code execution (RCE) vulnerability, identified as React2Shell (CVE-2025-55182), was disclosed in December 2025, affecting applications built with React Server Components and related frameworks such as Next.js. Public proof-of-concept exploits were released shortly after disclosure, enabling attackers to inject and execute arbitrary code on vulnerable systems. Security researchers and vendors, including Sysdig, responded by publishing detection guidance and threat bulletins, urging organizations to patch affected software, update dependencies, and monitor for signs of compromise. The vulnerability's severity and ease of exploitation have made it a high-priority target for both opportunistic and advanced threat actors.

Notably, botnet operators, including those behind the RondoDox botnet, have begun actively targeting the React2Shell flaw to compromise systems at scale. Security advisories recommend immediate patching and enhanced monitoring, as exploitation attempts have increased rapidly following the public release of exploit code. The incident underscores the ongoing risk posed by supply chain and framework vulnerabilities, especially when widely used components are affected and attackers move quickly to weaponize new flaws.

Timeline

  1. Dec 1, 2025

    Kubernetes 1.35 introduced security improvements

    During December 2025, Kubernetes version 1.35 was released with security improvements highlighted as part of the month's notable defensive developments.

  2. Dec 1, 2025

    DDoS attack disrupted French postal and banking services

    In December 2025, a distributed denial-of-service attack caused service disruptions affecting French postal and banking services.

  3. Dec 1, 2025

    European Space Agency disclosed a breach with data theft

    In December 2025, the European Space Agency suffered a breach that resulted in significant data theft, although network segmentation reportedly limited the overall impact.

  4. Dec 1, 2025

    Sysdig identified EtherRAT campaign using Ethereum smart contracts for C2

    In December 2025, Sysdig's Threat Research Team identified EtherRAT, a multi-stage malware campaign that used Ethereum smart contracts for command-and-control and exploited React2Shell for access.

  5. Dec 1, 2025

    React2Shell flaw emerged as a critical remote code execution risk

    In December 2025, React2Shell (CVE-2025-55182) in React Server Components was identified as enabling unauthenticated remote code execution, prompting urgent patching and monitoring recommendations.

  6. Dec 1, 2025

    BRICKSTORM activity targeted Linux cloud environments

    In December 2025, the BRICKSTORM backdoor, attributed to China state-sponsored actors, targeted Linux-based cloud environments in critical sectors using advanced evasion and persistence techniques.

  7. Dec 1, 2025

    MongoBleed vulnerability was actively exploited at scale

    During December 2025, attackers actively exploited MongoBleed (CVE-2025-14847), a long-standing MongoDB vulnerability, to leak sensitive data from tens of thousands of exposed instances.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

January 6, 2026 at 12:00 AM
January 6, 2026 at 12:00 AM

Related Stories

Exploitation of React2Shell Vulnerability (CVE-2025-55182) in IoT and Web Applications

Exploitation of React2Shell Vulnerability (CVE-2025-55182) in IoT and Web Applications

A critical security vulnerability, React2Shell (CVE-2025-55182), affecting React Server Components and Next.js, has been widely exploited by both state-sponsored and criminal threat actors. The flaw enables unauthenticated remote code execution, making it a prime target for ransomware groups, botnet operators, and espionage campaigns throughout 2025. Notably, the RondoDox botnet leveraged this vulnerability in a persistent nine-month campaign to compromise IoT devices and web applications, enrolling tens of thousands of systems into its network. According to Shadowserver Foundation data, over 84,000 instances remained vulnerable as of early January 2026, with the majority located in the United States. PolySwarm's annual review highlights React2Shell as the year's most significant exploit, noting its rapid weaponization by both nation-state actors and cybercriminals. Ransomware groups such as Cl0p and Qilin used zero-day exploits, including React2Shell, to target enterprises, government, and healthcare sectors. The widespread abuse of this vulnerability underscores the urgent need for organizations to patch affected systems and monitor for signs of compromise, as attackers continue to exploit trusted software components for initial access and lateral movement.

1 months ago
React2Shell Remote Code Execution Vulnerability in React 19 and Next.js

React2Shell Remote Code Execution Vulnerability in React 19 and Next.js

A critical remote code execution vulnerability, dubbed **React2Shell**, was discovered in the React 19 library, specifically affecting React Server Components. The flaw allows unauthenticated attackers to execute arbitrary code on servers by sending crafted requests, making it a severe risk for organizations using default React and Next.js deployments. Within hours of public disclosure, security firms including Google’s Threat Intelligence Group and AWS confirmed active exploitation in the wild, highlighting the shrinking window between vulnerability awareness and real-world attacks. Researchers from Wiz and Unit 42 demonstrated that even clean, default deployments were susceptible, emphasizing the widespread impact due to the popularity of these frameworks. Threat actors rapidly weaponized the React2Shell vulnerability, with the RondoDoX botnet launching automated exploitation campaigns targeting both web applications and IoT devices. CloudSEK’s analysis of command and control logs revealed a multi-month campaign, with a significant spike in attacks following the vulnerability’s disclosure in December 2025. The RondoDoX botnet deployed various payloads, including web shells and cryptominers, and quickly adapted its infrastructure in response to security firm reports. Organizations with technology stacks overlapping the targeted vectors were promptly alerted, underscoring the urgent need for patching and monitoring in environments using React 19 and Next.js.

1 months ago
Active Exploitation of React2Shell (CVE-2025-55182) in React Server Components

Active Exploitation of React2Shell (CVE-2025-55182) in React Server Components

Threat actors are actively exploiting **React2Shell** (**CVE-2025-55182**), a critical remote code execution flaw in the Flight protocol used for client-server communication in **React Server Components**. The issue is attributed to **insecure deserialization** that can allow unauthorized code execution on vulnerable servers, with observed targeting across insurance, e-commerce, and IT organizations. Reported payloads include the **XMRig** cryptocurrency miner as well as multiple botnets and remote access tooling; campaigns observed against Russian entities deployed **RustoBot** and **Kaiji**, while other activity distributed malware such as **CrossC2**, **Tactical RMM**, **VShell**, and **EtherRAT**. Affected packages include `react-server-dom-webpack`, `react-server-dom-parcel`, and `react-server-dom-turbopack` in versions **19.0**, **19.1.0**, **19.1.1**, and **19.2.0**, with fixes available in **19.0.1**, **19.1.2**, and **19.2.1**. Separate reporting highlighted that attackers leveraged a **public proof-of-concept (PoC)** for React2Shell and began targeting organizations within hours, reinforcing that rapid weaponization is now common; defenders are advised to patch and also perform post-patch validation, including checking for indicators of compromise, verifying *Next.js* and dependency versions, rebuilding projects after updates, and confirming lockfiles no longer reference vulnerable package versions.

3 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Exploitation of React2Shell Vulnerability by Botnets and Threat Actors | Mallory