React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable

React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable

Over 77,000 Internet-exposed IP addresses are vulnerable to the critical React2Shell remote code execution flaw (CVE-2025-55182), with researchers now confirming that attackers have already compromised over 30 organizations across multiple sectors.

React2Shell is an unauthenticated remote code execution vulnerability that can be exploited via a single HTTP request and affects all frameworks that implement React Server Components, including Next.js, which uses the same deserialization logic.

React disclosed the vulnerability on December 3, explaining that unsafe deserialization of client-controlled data inside React Server Components enables attackers to trigger remote, unauthenticated execution of arbitrary commands.

Developers are required to update React to the latest version, rebuild their applications, and then redeploy to fix the vulnerability.

On December 4, security researcher Maple3142 published a working proof-of-concept demonstrating remote command execution against unpatched servers. Soon after, scanning for the flaw accelerated as attackers and researchers began using the public exploit with automated tools.

Over 77,000 vulnerable IP addresses

Shadowserver Internet watchdog group now reports that it has detected 77,664 IP addresses vulnerable to the React2Shell flaw, with approximately 23,700 in the United States.

Geographic distribution of vulnerable IP addresses

Source: ShadowServer

The researchers determined that IP addresses were vulnerable using a de

Source: https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable/

React cybersecurity rating report: https://www.rankiteo.com/company/reactofficial

"id": "REA1765051268",
"linkid": "reactofficial",
"type": "Vulnerability",
"date": "12/2025",
"severity": "100",
"impact": "6",
"explanation": "Attack threatening the economy of geographical region"
{'affected_entities': [{'customers_affected': None,
                                     'industry': None,
                                     'location': 'Global (23,700 vulnerable '
                                                 'IPs in the United States)',
                                     'name': None,
                                     'size': None,
                                     'type': 'Organization'}],
              'attack_vector': 'Unauthenticated HTTP request',
              'data_breach': {'data_encryption': None,
                              'data_exfiltration': None,
                              'file_types_exposed': None,
                              'number_of_records_exposed': None,
                              'personally_identifiable_information': None,
                              'sensitivity_of_data': None,
                              'type_of_data_compromised': None},
              'date_publicly_disclosed': '2024-12-03',
              'description': 'Over 77,000 Internet-exposed IP addresses are '
                             'vulnerable to the critical React2Shell remote '
                             'code execution flaw (CVE-2025-55182). Attackers '
                             'have already compromised over 30 organizations '
                             'across multiple sectors. React2Shell is an '
                             'unauthenticated remote code execution '
                             'vulnerability exploitable via a single HTTP '
                             'request, affecting frameworks implementing React '
                             'Server Components, including Next.js. The flaw '
                             'arises from unsafe deserialization of '
                             'client-controlled data, enabling remote, '
                             'unauthenticated execution of arbitrary commands.',
              'impact': {'brand_reputation_impact': None,
                         'conversion_rate_impact': None,
                         'customer_complaints': None,
                         'data_compromised': None,
                         'downtime': None,
                         'financial_loss': None,
                         'identity_theft_risk': None,
                         'legal_liabilities': None,
                         'operational_impact': 'Remote command execution, '
                                               'potential full system '
                                               'compromise',
                         'payment_information_risk': None,
                         'revenue_loss': None,
                         'systems_affected': 'React Server Components (Next.js '
                                             'and similar frameworks)'},
              'initial_access_broker': {'backdoors_established': None,
                                        'data_sold_on_dark_web': None,
                                        'entry_point': None,
                                        'high_value_targets': None,
                                        'reconnaissance_period': None},
              'investigation_status': 'Ongoing',
              'post_incident_analysis': {'corrective_actions': 'Patch '
                                                               'management, '
                                                               'secure coding '
                                                               'practices, '
                                                               'vulnerability '
                                                               'scanning',
                                         'root_causes': 'Unsafe '
                                                        'deserialization of '
                                                        'client-controlled '
                                                        'data in React Server '
                                                        'Components'},
              'ransomware': {'data_encryption': None,
                             'data_exfiltration': None,
                             'ransom_demanded': None,
                             'ransom_paid': None,
                             'ransomware_strain': None},
              'recommendations': 'Update React to the latest version, rebuild '
                                 'applications, and redeploy. Monitor for '
                                 'exploitation attempts and apply '
                                 'network-level protections.',
              'references': [{'date_accessed': None,
                              'source': 'React Security Advisory',
                              'url': None},
                             {'date_accessed': None,
                              'source': 'Shadowserver Internet Watchdog Group',
                              'url': None},
                             {'date_accessed': None,
                              'source': 'Maple3142 Proof-of-Concept Exploit',
                              'url': None}],
              'regulatory_compliance': {'fines_imposed': None,
                                        'legal_actions': None,
                                        'regulations_violated': None,
                                        'regulatory_notifications': None},
              'response': {'adaptive_behavioral_waf': None,
                           'communication_strategy': None,
                           'containment_measures': 'Update React to the latest '
                                                   'version, rebuild and '
                                                   'redeploy applications',
                           'enhanced_monitoring': None,
                           'incident_response_plan_activated': None,
                           'law_enforcement_notified': None,
                           'network_segmentation': None,
                           'on_demand_scrubbing_services': None,
                           'recovery_measures': None,
                           'remediation_measures': 'Patch management, '
                                                   'vulnerability scanning',
                           'third_party_assistance': None},
              'title': 'React2Shell Remote Code Execution Vulnerability '
                       '(CVE-2025-55182)',
              'type': 'Remote Code Execution (RCE)',
              'vulnerability_exploited': 'CVE-2025-55182 (React2Shell)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.