Half of exposed React servers remain unpatched amid attacks
Briefly

Half of exposed React servers remain unpatched amid attacks
Roughly half of publicly exposed React server resources remain unpatched for CVE-2025-55182, creating widespread attack surface for unauthenticated remote code execution. The flaw impacts React Server Components and dependent frameworks like Next.js due to unsafe deserialization in server-side packages, allowing crafted requests to trigger RCE. Researchers have observed at least 15 distinct intrusion clusters exploiting the bug, ranging from low-sophistication cryptomining operations to hands-on-keyboard intrusion tooling. Observed activity includes Kinsing and C3Pool miners, Python campaigns that exfiltrate secrets while posing as miner droppers, Sliver command-and-control infrastructure, and a JavaScript file injector infecting server-side deployments.
"Half of the internet-facing systems vulnerable to a fast-moving React remote code execution flaw remain unpatched, even as exploitation has exploded into more than a dozen active attack clusters ranging from bargain-basement cryptominers to state-linked intrusion tooling. That's the assessment from Alon Schindel, VP of AI and Threat Research at Wiz, who says CVE-2025-55182 - the React server-side vulnerability dubbed "React2Shell" - is now being actively exploited at scale,"
"According to Wiz's latest telemetry, roughly 50 percent of publicly exposed resources known to be vulnerable are still running unpatched code, giving attackers a comfortable head start. The critical-severity flaw, first disclosed earlier this month, affects React Server Components and dependent frameworks such as Next.js and stems from unsafe deserialization in React's server-side packages, allowing an unauthenticated attacker to send a crafted request to achieve remote code execution."
"What began as opportunistic scanning and cryptomining has now broadened into something messier. Wiz says it is seeing a clear split between "commodity" exploitation - dominated by familiar cryptomining operations using tools like Kinsing, C3Pool, and custom loaders - and more deliberate intrusion sets deploying post-exploitation frameworks and bespoke malware. Among the clusters observed are Python-based campaigns masquerading as miner droppers while quietly exfiltrating secrets, Sliver command-and-control infrastructure used for hands-on-keyboard operations, and a JavaScript file injector that systematically infects every server-side *"
Read at Theregister
Unable to calculate read time
[
|
]