Executive Summary
In early 2026, a large-scale credential harvesting operation exploited the React2Shell vulnerability (CVE-2025-55182) to compromise 766 Next.js hosts. Attackers leveraged this critical remote code execution flaw in React Server Components to gain unauthorized access to sensitive data, including database credentials, SSH private keys, AWS secrets, shell command history, Stripe API keys, and GitHub tokens. The breach underscores the severe risks associated with unpatched vulnerabilities in widely used web frameworks.
The React2Shell vulnerability, disclosed in December 2025, has been actively exploited by threat actors, leading to significant data breaches and system compromises. This incident highlights the urgent need for organizations to promptly apply security patches and implement robust monitoring to detect and mitigate exploitation attempts.
Why This Matters Now
The React2Shell vulnerability continues to be actively exploited, emphasizing the critical importance of timely patching and vigilant monitoring to prevent unauthorized access and data breaches.
Attack Path Analysis
Attackers exploited the React2Shell vulnerability (CVE-2025-55182) to gain unauthorized access to Next.js hosts. They escalated privileges by deploying remote access tools and creating new user accounts. The attackers moved laterally within the network, accessing sensitive data across multiple systems. They established command and control channels using tools like Cobalt Strike. Sensitive credentials and secrets were exfiltrated to external servers. The impact included unauthorized access to critical systems and potential data breaches.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited the React2Shell vulnerability (CVE-2025-55182) in React Server Components to gain unauthorized access to Next.js hosts.
Related CVEs
CVE-2025-55182
CVSS 10A critical pre-authentication remote code execution vulnerability in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0, allowing unauthenticated attackers to execute arbitrary code via specially crafted HTTP requests.
Affected Products:
Meta React Server Components – 19.0.0, 19.1.0, 19.1.1, 19.2.0
Vercel Next.js – 15.x, 16.x
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Command and Scripting Interpreter
Valid Accounts
Ingress Tool Transfer
Unsecured Credentials
Network Service Discovery
Application Layer Protocol
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Address vulnerabilities for custom and bespoke software
Control ID: 6.2.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA Zero Trust Maturity Model 2.0 – Identity Management
Control ID: Pillar 1: Identity
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Next.js hosts compromised via CVE-2025-55182 exposing source code, API keys, and development credentials. Zero trust segmentation and egress filtering critical for preventing lateral movement.
Financial Services
Stripe API keys and AWS secrets harvested threaten payment processing infrastructure. Encrypted traffic controls and anomaly detection essential for protecting financial transactions and compliance.
Information Technology/IT
766 breached hosts indicate massive IT infrastructure exposure. Cloud firewall and Kubernetes security capabilities needed to prevent credential theft and unauthorized cloud resource access.
Internet
Web hosting and internet service providers face credential harvesting attacks targeting SSH keys and database access. Inline IPS and threat detection capabilities required for protection.
Sources
- Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentialshttps://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.htmlVerified
- NVD - CVE-2025-55182https://nvd.nist.gov/vuln/detail/CVE-2025-55182Verified
- React2Shell (CVE-2025-55182)https://react2shell.com/Verified
- CISA Known Exploited Vulnerabilities Cataloghttps://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-55182Verified
- React2Shell flaw (CVE-2025-55182) exploited for remote code executionhttps://www.sophos.com/en-us/blog/react2shell-flaw-cve-2025-55182-exploited-for-remote-code-executionVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and controlled egress policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's initial access may have been constrained, reducing the likelihood of unauthorized entry into the Next.js hosts.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges may have been limited, reducing the risk of unauthorized access to sensitive systems.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement may have been restricted, reducing the scope of systems they could access.
Control: Multicloud Visibility & Control
Mitigation: The establishment of command and control channels may have been detected and disrupted, reducing the attacker's ability to maintain control.
Control: Egress Security & Policy Enforcement
Mitigation: The exfiltration of sensitive data may have been prevented, reducing the risk of data breaches.
The overall impact of the attack may have been minimized, reducing unauthorized access and data breaches.
Impact at a Glance
Affected Business Functions
- Web Application Services
- Cloud Infrastructure Management
- Data Security
Estimated downtime: 7 days
Estimated loss: $500,000
Database credentials, SSH private keys, AWS secrets, shell command history, Stripe API keys, GitHub tokens
Recommended Actions
Key Takeaways & Next Steps
- • Implement Inline IPS (Suricata) to detect and prevent exploitation attempts of known vulnerabilities like React2Shell.
- • Deploy Zero Trust Segmentation to limit lateral movement within the network.
- • Utilize East-West Traffic Security to monitor and control internal traffic flows.
- • Enforce Egress Security & Policy Enforcement to prevent unauthorized data exfiltration.
- • Enhance Threat Detection & Anomaly Response capabilities to identify and respond to suspicious activities promptly.



