If you use
React or
Next.js, I have posted some great news for you today.
Google has found 5 more
Chinese hacking groups using a vulnerability in
React2Shell (
CVE-2025-55182) to target websites. With
React2Shell, hackers are able to run code on your server with just one web request. Isn't that frightening?
How React2Shell Works
All versions of
React are impacted (
19.0 to 19.2.0). Hackers can utilize this bug to compromise user data such as credentials (
AWS logins,
configuration files, etc.) or other sensitive data through the use of these tools:
react-server-dom-parcel and
react-server-dom-webpack. If these components are incorporated within your project/app, then you could be compromised.
The Hacking Groups
Google says five more Chinese groups are exploiting this flaw:
- UNC6600 – uses MINOCAT tunneling
- UNC6586 – uses SNOWLIGHT downloader
- UNC6588 – spreads COMPOOD backdoor
- UNC6603 – updated HISONIC backdoor
- UNC6595 – ANGRYREBEL.LINUX RAT
Additionally, other types of hackers, including some from
Iran and those who mine
cryptocurrency, are actively looking for unpatched systems that they can exploit. According to the
Shadowserver Foundation, there are still over
116,000 networks with IP addresses that are vulnerable (or potentially vulnerable), including over
80,000 IPs located in the
United States.
Recommendations For Action
- Make sure that all React and Next.js applications are updated immediately.
- Review all AWS credentials and server configuration settings.
- Be vigilant for suspicious activity on your company's networks.
Overall
The issue of
React2Shell is a classic example of how a single coding error can open up countless potentially harmful consequences. With more and more
Chinese hacking groups involved in this type of activity, it will be increasingly important for people to remain vigilant against potential threats.
If they do not begin to update their software applications, they are at risk of being hacked before they discover the breach.