Executive Summary
In June 2025, a critical remote code execution (RCE) vulnerability, CVE-2025-55182, impacting React Server Components (RSC) was added to CISA's Known Exploited Vulnerabilities catalog following confirmed reports of active exploitation. Attackers leveraged the flaw, known as 'React2Shell,' to execute arbitrary code on vulnerable servers by exploiting inadequate input validation, enabling lateral movement and potential compromise of sensitive systems and data. Several organizations in sectors reliant on JavaScript-based web infrastructures were affected, resulting in service disruptions and the risk of unauthorized data access and exfiltration.
This incident highlights a broader trend in targeting supply chain and open-source components within modern web development stacks. The increasing frequency and sophistication of attacks on widely adopted frameworks like React underscore the urgency for rapid vulnerability remediation, improved code validation, and enterprise adoption of proactive threat detection to mitigate future large-scale RCE campaigns.
Why This Matters Now
React2Shell’s inclusion in the CISA KEV list signals urgent, active risk for any organizations running unpatched React Server Components in production. With public exploit code available and rapid weaponization by threat actors, the window for mitigation is extremely narrow, making immediate patching, robust segmentation, and monitoring critical to prevent compromise.
Attack Path Analysis
Attackers exploited the critical React2Shell (CVE-2025-55182) remote code execution vulnerability to gain initial access to cloud workloads. After initial foothold, they likely escalated privileges via exploitation of container or workload misconfigurations. The adversaries moved laterally within the cloud environment, targeting additional resources and services. They established command and control through outbound connections, potentially leveraging encrypted channels or proxy networks. Sensitive data was exfiltrated using covert or authorized outbound traffic flows. Finally, the attackers could cause impact via data destruction, ransomware deployment, or business disruption.
Kill Chain Progression
Initial Compromise
Description
Adversaries exploited a publicly exposed React Server Component (RSC) vulnerable to CVE-2025-55182, enabling remote code execution on cloud infrastructure.
Related CVEs
CVE-2025-55182
CVSS 10A pre-authentication remote code execution vulnerability in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 allows attackers to execute arbitrary code by sending crafted HTTP requests to Server Function endpoints.
Affected Products:
Facebook, Inc. React Server Components – 19.0.0, 19.1.0, 19.1.1, 19.2.0
Exploit Status:
exploited in the wildCVE-2025-55183
CVSS 7.5An information leak vulnerability in React Server Components versions 19.0.0 through 19.2.1 allows attackers to retrieve the source code of Server Functions by sending specially crafted HTTP requests.
Affected Products:
Facebook, Inc. React Server Components – 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, 19.2.1
Exploit Status:
proof of conceptCVE-2025-55184
CVSS 7.5A pre-authentication denial of service vulnerability in React Server Components versions 19.0.0 through 19.2.1 allows attackers to cause the server to hang by sending crafted HTTP requests to Server Function endpoints.
Affected Products:
Facebook, Inc. React Server Components – 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, 19.2.1
Exploit Status:
proof of concept
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Command and Scripting Interpreter
Exploitation of Remote Services
Valid Accounts
Impair Defenses
Network Service Discovery
Ingress Tool Transfer
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Address vulnerabilities for custom and bespoke software
Control ID: 6.2.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Digital Operational Resilience Act) – ICT Risk Management Framework
Control ID: Art. 8
CISA ZTMM 2.0 – Vulnerability and Patch Management
Control ID: Pillar 3: Applications and Workloads
NIS2 Directive – Cybersecurity Risk-management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Critical React Server Components RCE vulnerability (CVE-2025-55182) enables remote code execution in web applications, requiring immediate patching and zero trust segmentation implementation.
Financial Services
Remote code execution exploits threaten payment systems and customer data, demanding enhanced egress security, encrypted traffic controls, and PCI compliance enforcement measures.
Health Care / Life Sciences
Active exploitation of React components risks patient data breaches and system compromise, necessitating HIPAA-compliant threat detection and anomaly response capabilities.
Information Technology/IT
React2Shell vulnerability impacts cloud-native applications requiring Kubernetes security, inline IPS protection, and multicloud visibility for comprehensive threat mitigation and incident response.
Sources
- Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitationhttps://thehackernews.com/2025/12/critical-react2shell-flaw-added-to-cisa.htmlVerified
- Critical Security Vulnerability in React Server Componentshttps://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-componentsVerified
- Meta React Server Components Remote Code Execution Vulnerabilityhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-55182Verified
- CVE-2025-55182 Detailhttps://nvd.nist.gov/vuln/detail/CVE-2025-55182Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, microsegmentation, strong east-west controls, inline IDS/IPS, and egress policy enforcement would have greatly constrained the attacker’s ability to laterally move, exfiltrate data, or impact systems even after initial exploit. Enhanced threat detection and centralized multicloud visibility would further allow rapid detection and containment of malicious activity.
Control: Cloud Firewall (ACF)
Mitigation: Prevented inbound exploitation attempts on exposed workloads.
Control: Zero Trust Segmentation
Mitigation: Blocked privilege escalation to adjacent workloads or sensitive namespaces.
Control: East-West Traffic Security
Mitigation: Alerted and stopped unauthorized lateral traffic between workloads or regions.
Control: Inline IPS (Suricata)
Mitigation: Detected and prevented known malicious C2 traffic patterns.
Control: Egress Security & Policy Enforcement
Mitigation: Flagged and blocked unauthorized data exfiltration attempts.
Rapid detection and response to anomalous and destructive activities minimized blast radius.
Impact at a Glance
Affected Business Functions
- Web Application Services
- Customer Support Portals
Estimated downtime: 3 days
Estimated loss: $500,000
Potential exposure of sensitive customer data and proprietary source code due to unauthorized access and information leakage vulnerabilities.
Recommended Actions
Key Takeaways & Next Steps
- • Segment workloads using identity-based Zero Trust Segmentation to prevent lateral movement after exploit.
- • Deploy Inline IPS and Cloud Firewall solutions to proactively block exploit and C2 traffic across all ingress and egress points.
- • Enforce strict east-west and egress traffic policies to limit attacker communication and data exfiltration from compromised assets.
- • Enhance cloud visibility and incident response through centralized multicloud security fabric and continuous anomaly/threat monitoring.
- • Regularly audit and update firewall rules, segmentation policies, and workload posture to reduce attack surface and exposure of exploitable services.



