Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容和关键点。 文章主要讲的是React Server Components(RSC)中的一个严重安全漏洞CVE-2025-55182,CVSS评分10分,属于远程代码执行漏洞。CISA已经将其加入已知被利用的漏洞目录。攻击者无需认证即可触发此漏洞,影响多个下游框架如Next.js、React Router等。已经有多个威胁组织利用此漏洞进行攻击,包括加密货币挖矿和恶意软件下载。修复版本已经发布,建议用户尽快更新。 接下来,我需要将这些关键信息浓缩到100字以内。要确保涵盖漏洞名称、影响范围、攻击情况、修复措施以及受影响的框架。同时,语言要简洁明了,避免使用复杂的术语。 可能的结构是:先点出漏洞及其严重性,然后说明影响范围和攻击情况,最后提到修复措施和受影响的框架。 现在试着组织语言: React Server Components发现严重漏洞CVE-2025-55182(CVSS 10分),允许未认证攻击者远程执行代码。该漏洞影响Next.js等框架,并已被多个黑客组织利用进行攻击。建议用户立即更新至修复版本以防范风险。 这样大约70字左右,符合要求。 </think> React Server Components发现严重漏洞CVE-2025-55182(CVSS 10分),允许未认证攻击者远程执行代码。该漏洞影响Next.js等框架,并已被多个黑客组织利用进行攻击。建议用户立即更新至修复版本以防范风险。 2025-12-6 11:40:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Vulnerability / Patch Management

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild.

The vulnerability, CVE-2025-55182 (CVSS score: 10.0), relates to a case of remote code execution that could be triggered by an unauthenticated attacker without requiring any special setup. It's also tracked as React2Shell.

"Meta React Server Components contains a remote code execution vulnerability that could allow unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints," CISA said in an advisory.

The problem stems from insecure deserialization in the library's Flight protocol, which React uses to communicate between a server and client. As a result, it leads to a scenario where an unauthenticated, remote attacker can execute arbitrary commands on the server by sending specially crafted HTTP requests.

Cybersecurity

"The process of converting text into objects is widely considered one of the most dangerous classes of software vulnerabilities," Martin Zugec, technical solutions director at Bitdefender, said. "The React2Shell vulnerability resides in the react-server package, specifically in how it parses object references during deserialization."

The vulnerability has been addressed versions 19.0.1, 19.1.2, and 19.2.1 of the following libraries -

  • react-server-dom-webpack
  • react-server-dom-parcel
  • react-server-dom-turbopack

Some of the downstream frameworks that depend on React are also impacted. This includes: Next.js, React Router, Waku, Parcel, Vite, and RedwoodSDK.

The development comes after Amazon reported that it observed attack attempts originating from infrastructure associated with Chinese hacking groups like Earth Lamia and Jackpot Panda within hours of public disclosure of the flaw. Coalition, Fastly, GreyNoise, VulnCheck, and Wiz have also reported seeing exploitation efforts targeting the flaw, indicating that multiple threat actors are engaging in opportunistic attacks.

Image Source: GreyNoise

Some of the attacks have involved the deployment of cryptocurrency miners, as well as the execution of "cheap math" PowerShell commands to ascertain successful exploitation, followed by running commands to drop in-memory downloaders capable of retrieving an additional payload from a remote server.

According to data shared by attack surface management platform Censys, there are about 2.15 million instances of internet-facing services that may be affected by this vulnerability. This comprises exposed web services using React Server Components and exposed instances of frameworks such as Next.js, Waku, React Router, and RedwoodSDK.

Cybersecurity

In a statement shared with The Hacker News, Palo Alto Networks Unit 42 said it has confirmed over 30 affected organizations across numerous sectors, with one set of activity consistent with a Chinese hacking crew tracked as UNC5174 (aka CL-STA-1015). The attacks are characterized by the deployment of SNOWLIGHT and VShell.

"We have observed scanning for vulnerable RCE, reconnaissance activity, attempted theft of AWS configuration and credential files, as well as installation of downloaders to retrieve payloads from attacker command and control infrastructure," Justin Moore, senior manager of threat intel research at Palo Alto Networks Unit 42, said.

Security researcher Lachlan Davidson, who is credited with discovering and reporting the flaw, has since released multiple proof-of-concept (PoC) exploits, making it imperative that users update their instances to the latest version as soon as possible. Another working PoC has been published by a Taiwanese researcher who goes by the GitHub handle maple3142.

Pursuant to Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies have until December 26, 2025, to apply the necessary updates to secure their networks.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/critical-react2shell-flaw-added-to-cisa.html
如有侵权请联系:admin#unsafe.sh