Executive Summary
In December 2025, a critical vulnerability known as React2Shell (CVE-2025-55182) was discovered in React Server Components, affecting versions 19.0 through 19.2.0. This flaw allows unauthenticated remote code execution via a single malicious HTTP request, enabling attackers to execute arbitrary code on vulnerable servers. Exploitation was observed within hours of disclosure, with state-sponsored groups from China and North Korea actively targeting affected systems. The rapid exploitation underscores the vulnerability's severity and the need for immediate remediation. (microsoft.com)
The widespread use of React in web applications amplifies the risk, as many organizations may unknowingly be exposed. This incident highlights the critical importance of prompt patching and vigilant monitoring to defend against rapidly evolving cyber threats. (aws.amazon.com)
Why This Matters Now
The React2Shell vulnerability is actively exploited by state-sponsored actors, posing immediate risks to organizations using React Server Components. Prompt patching and enhanced monitoring are essential to mitigate potential breaches and data compromises.
Attack Path Analysis
Attackers exploited the React2Shell vulnerability (CVE-2025-55182) to gain initial access to vulnerable servers. They then escalated privileges by executing arbitrary code, enabling them to install malware and establish persistence. Utilizing the compromised servers, attackers moved laterally within the network to access additional systems. They established command and control channels to exfiltrate sensitive data. The exfiltrated data was then transmitted to attacker-controlled servers. Finally, the attackers deployed cryptominers and other malware, causing operational disruptions and financial losses.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited the React2Shell vulnerability (CVE-2025-55182) in React Server Components to gain unauthorized access to servers.
Related CVEs
CVE-2025-55182
CVSS 10A pre-authentication remote code execution vulnerability in React Server Components allows unauthenticated attackers to execute arbitrary code on affected servers.
Affected Products:
Meta React Server Components – 19.0.0, 19.1.0, 19.1.1, 19.2.0
Vercel Next.js – 15.x, 16.x
IBM IBM Edge Data Collector – 8.11
IBM IBM Concert Software – 2.1
IBM IBM Rhapsody Systems Engineering – 8.4.7
Exploit Status:
exploited in the wildReferences:
https://www.ibm.com/support/pages/security-bulletin-manta-automated-data-lineage-ibm-cloud-pak-data-vulnerable-critical-security-vulnerability-react-server-components-cve-2025-55182-0https://trustedsec.com/about-us/news/security-advisory-react2shell-cve-2025-55182-critical-rce-vulnerabilityhttps://securelist.com/cve-2025-55182-exploitation/118331/
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Exploit Public-Facing Application
Command and Scripting Interpreter
Server Software Component: Web Shell
Valid Accounts
Phishing: Spearphishing Attachment
Scheduled Task/Job
OS Credential Dumping
Data Encrypted for Impact
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity Management and Access Control
Control ID: Pillar 1: Identity
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
Multi-vector exploitation campaigns targeting Windows/Linux systems pose critical risks to financial infrastructure, requiring enhanced zero trust segmentation and encrypted traffic monitoring capabilities.
Health Care / Life Sciences
Critical vulnerabilities in Microsoft Office and archiver exploits threaten HIPAA compliance, demanding immediate patch management and egress security enforcement for patient data protection.
Government Administration
APT attacks leveraging C2 frameworks and SharePoint vulnerabilities create significant national security risks, necessitating comprehensive threat detection and anomaly response systems implementation.
Information Technology/IT
React2Shell and Redis vulnerabilities directly impact cloud-native applications and Kubernetes environments, requiring enhanced application security and multicloud visibility controls for service providers.
Sources
- Exploits and vulnerabilities in Q4 2025https://securelist.com/vulnerabilities-and-exploits-in-q4-2025/119105/Verified
- Security Bulletin: MANTA Automated Data Lineage for IBM Cloud Pak for Data is vulnerable to Critical Security Vulnerability in React Server Components CVE-2025-55182https://www.ibm.com/support/pages/security-bulletin-manta-automated-data-lineage-ibm-cloud-pak-data-vulnerable-critical-security-vulnerability-react-server-components-cve-2025-55182-0Verified
- Security Advisory: React2Shell (CVE-2025-55182) - Critical RCE Vulnerabilityhttps://trustedsec.com/about-us/news/security-advisory-react2shell-cve-2025-55182-critical-rce-vulnerabilityVerified
- It didn’t take long: CVE-2025-55182 is now under active exploitationhttps://securelist.com/cve-2025-55182-exploitation/118331/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and controlled egress policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While initial access may still occur, the attacker's ability to escalate privileges and establish persistence could be constrained, reducing the potential for further exploitation.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges and establish persistence could be constrained, reducing the potential for further exploitation.
Control: East-West Traffic Security
Mitigation: The attacker's ability to move laterally within the network could be significantly constrained, reducing the risk of accessing additional systems.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish command and control channels could be constrained, reducing the risk of data exfiltration.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive data could be constrained, reducing the risk of data loss.
The attacker's ability to deploy cryptominers and other malware could be constrained, reducing the risk of operational disruptions and financial losses.
Impact at a Glance
Affected Business Functions
- Web Application Services
- E-commerce Platforms
- Content Management Systems
Estimated downtime: 7 days
Estimated loss: $500,000
Potential exposure of sensitive user data and intellectual property.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Inline IPS (Suricata) to detect and prevent exploitation attempts of known vulnerabilities like React2Shell.
- • Deploy Zero Trust Segmentation to limit lateral movement within the network, restricting unauthorized access between systems.
- • Utilize Threat Detection & Anomaly Response tools to identify and respond to unusual activities indicative of command and control communications.
- • Enforce Egress Security & Policy Enforcement to monitor and control outbound traffic, preventing unauthorized data exfiltration.
- • Ensure regular patching and updating of software components to mitigate vulnerabilities and reduce the attack surface.



