JANUARY 2026 UPDATE: One month after disclosure, React2Shell (CVE-2025-55182) remains under
sustained exploitation with over 8.1 million attack sessions recorded1. Security firm
GreyNoise reports 300,000-400,000 daily attacks from 8,163 unique IPs across 101
countries1. Over 644,000 domains remain vulnerable despite patches being available since
December 3, 20252. CISA’s federal remediation deadline (December 26, 2025) has passed3.
If you haven’t upgraded to React 19.2.34 and Next.js 16.0.10+, you are actively at
risk.
December 2025 UPDATE: Security researchers confirm active exploitation in the wild5.
CVE-2025-55182, now widely known as “React2Shell,” has been integrated into Mirai and other
botnet exploitation toolkits6. Nearly 50% of attacking IPs are newly registered infrastructure
(December 2025)1. Post-exploitation activities include cryptocurrency mining, credential theft,
and ransomware deployment7. Five China-nexus APT groups (UNC6600, UNC6586, UNC6588,
UNC6603, UNC6595) have been specifically attributed to this campaign5.
Disclosure Notice: This vulnerability was publicly disclosed on December 3, 2025. If you’re
running Next.js 14.3+, 15, or 16 with React Server Components, you should upgrade immediately,
regardless of your hosting provider.
Today we witnessed defense in depth working exactly as intended. Within hours of CVE-2025-55182 being disclosed, a critical remote code execution vulnerability in React Server Components, we received alerts from two different sources:
Vercel’s dashboard, warning us that rules were already protecting our production deployment
Dependabot PR #87, automatically upgrading Next.js from 16.0.6 to 16.0.7
This is what modern security infrastructure looks like: multiple layers working in concert. Vercel’s WAF provided immediate protection before we could even review the PR, while Dependabot delivered the actual patch for permanent remediation.
In this post, we’ll break down what CVE-2025-55182 is, why it matters, how these layered defenses protected our app, and what you should do to secure your own projects.
Takeaway
If you’re running Next.js 14.3+, 15.x, or 16.x with React Server Components, you must upgrade
immediately to React 19.2.3+ and Next.js 16.0.10+. Active exploitation is confirmed with
300,000-400,000 daily attacks and 644,000+ vulnerable domains still exposed as of January
2026.
For Business Leaders
Your development teams need immediate support to upgrade. React2Shell poses the same threat level as Log4Shell with confirmed botnet integration and nation-state exploitation. Budget emergency patching cycles and engage your security team.
CVE-2025-55182, also known as “React2Shell” in the security community, is a critical-severity vulnerability affecting . Under certain conditions, specially crafted requests can lead to unintended on the server.
Other affected frameworks: Vite with RSC, Parcel, React Router (RSC), RedwoodSDK, Waku
Quick Version Check:
Bash
npm ls next react # or check package.json
For Developers
Use Vercel's automated fix tool for fastest remediation: npx fix-react2shell-next. If self-hosting, deploy available WAF rules (Cloudflare, AWS WAF) while you test upgrades. Monitor for compromise using the detection patterns below.
Following React2Shell’s disclosure, researchers discovered three additional vulnerabilities4:
CVE
Severity
Impact
Patched In
CVE-2025-55182
CRITICAL
Remote Code Execution
React 19.0.1+
CVE-2025-55183
MEDIUM
Source code exposure
React 19.2.2+
CVE-2025-55184
HIGH
Denial of Service
React 19.2.2+ (incomplete)
CVE-2025-67779
HIGH
DoS (bypass of CVE-2025-55184)
React 19.2.3+
Critical: CVE-2025-55184’s original fix was incomplete4. Upgrade directly to React 19.2.3+ to address all four vulnerabilities in one update8.
Takeaway
Upgrading to React 19.2.2 is not sufficient. CVE-2025-55184’s original DoS fix was bypassed by
CVE-2025-67779. Always upgrade to the latest patched version (React 19.2.3+ as of January
2026) to address the complete CVE family.
Attack Chain Context: Exploitation is fully automated, progressing from scanner identification to payload deployment in under 10 seconds. Attackers use PowerShell arithmetic validation (powershell -c "40138*41979"), encoded payloads, AMSI bypasses, then deploy cryptocurrency miners, backdoors, and credential harvesters.
Here’s what makes this disclosure interesting from a DevSecOps perspective: Vercel’s platform detected and mitigated this vulnerability before Dependabot could even create a PR.
The disclosure and exploitation unfolded rapidly:
December 3, 2025 - Pre-disclosure: Vercel coordinates with the React team, develops WAF rules
December 3, 2025 - Public disclosure: CVE-2025-55182 and CVE-2025-66478 are published
December 3, 2025 - 20:49 UTC - Same-day Dependabot PR: PR #87 arrives
December 3, 2025 - Within hours of disclosure: Initial exploitation attempts observed by AWS Threat Intelligence; China-nexus threat actors (Earth Lamia, Jackpot Panda) begin active exploitation9
December 3, 2025 - 22:00 UTC: First scanning activity detected globally across honeypots; sustained exploitation begins1
December 4, 2025 - 21:04 UTC: Rapid7 validates weaponized exploit; proof-of-concept exploits become publicly available
December 5, 2025 - 06:00 UTC: Wiz Research sensors identify first victims compromised; rapid expansion of exploitation observed10
December 5, 2025 - Addition: CVE-2025-55182 added to CISA’s Known Exploited Vulnerabilities list3
December 5, 2025 - Lachlan Davidson : Original discoverer publishes official proof-of-concept; Metasploit exploit module available
Both systems worked, but with different roles and limitations:
Vercel’s WAF: Defense-in-depth layer (mitigation, not complete protection)
Vercel coordinated with the React team pre-disclosure, deployed WAF rules automatically to all projects, and continuously improved protections as bypass variants emerged. They released automated fix tooling (npx fix-react2shell-next) and began blocking new vulnerable deployments.
“We have created new WAF rules to address this vulnerability and deployed them to Vercel WAF that will automatically and at no cost protect all projects hosted on Vercel.”
— Jimour Lai, Vercel Security Engineer
Important WAF Limitations: Vercel acknowledges that “WAF rules are one layer of defense but can never guarantee 100% coverage.” As new exploit variants emerged (evidenced by payload variations observed on December 8), Vercel identified and patched WAF bypasses, but upgrading remains the only complete fix.
CISA Recognition: The addition of CVE-2025-55182 to CISA’s Known Exploited Vulnerabilities list on December 5 signals that this is now considered a priority threat by federal agencies, underscoring the urgency of remediation.
This means that while the WAF provided valuable defense-in-depth, our production deployment wasn’t truly secure until we merged the upgrade. The WAF bought us time and reduced risk, but it wasn’t a substitute for patching.
Takeaway
Web Application Firewalls (WAF) provide defense-in-depth, not complete protection. Vercel
acknowledges that “WAF rules can never guarantee 100% coverage.” As bypass variants emerged, WAF
rules were patched, but upgrading remains the only complete fix. Think of WAF as a
seatbelt—upgrading is fixing the brakes.
Vercel also worked with the React team to provide recommendations to major WAF and CDN providers. This collaborative approach helps protect the broader ecosystem, not just Vercel customers.
In an unprecedented security initiative, Vercel launched a $1 million bug bounty program specifically targeting WAF bypass techniques:
Program Results:
Engaged 116 security researchers to find every possible WAF bypass
Paid out over $1 million in bounties
Shipped 20 unique WAF updates within 48 hours as new bypass techniques were reported
All discovered bypass techniques are now permanent firewall additions
Dual-Layer Defense Architecture:
Vercel deployed a two-layer protection system:
Layer 1: Seawall WAF
Deep request inspection
Pattern-based exploit detection
Continuous updates from bug bounty findings
Layer 2: Runtime Mitigation (First Public Disclosure)
Operates directly on compute layer inside applications
Does not rely on heuristics
Directly eliminates code evaluation vector
covers 96% of Vercel traffic
Automatic alerting when triggered
This runtime layer provided visibility into actual WAF bypass attempts in production, allowing Vercel to state “with high confidence that the WAF was extraordinarily effective”—because they had ground truth data from the second layer.
Automated Remediation Tools:
Vercel Agent: Automatically detects vulnerable projects and opens PRs
Attack volumes have stabilized but not declined at 300k-400k daily attacks as of January 2026.
This vulnerability is now a permanent fixture in attacker toolkits, not a temporary threat
wave. Organizations with slow patch cycles remain at risk indefinitely.
Even with cloud provider WAF protections, you must upgrade. WAF rules provide interim protection but are not a permanent fix.
For Security Teams
Implement detection for PowerShell Event ID 4104 AMSI bypasses, encoded commands, and unusual RSC POST patterns. Scan for .env credential theft, systemd persistence, and cryptocurrency mining. Five China-nexus APT groups are actively exploiting this vulnerability.
Unlike typical vulnerabilities that see exploitation decline after initial waves, React2Shell exhibits characteristics of permanent infrastructure risk:
New malware families continue to emerge (PeerBlight, CowTunnel, KSwapDoor identified in January 2026)6
Ransomware group adoption signals high-value target assessment and commercial exploitation7
APT group sustained interest suggests strategic intelligence value beyond opportunistic attacks5
644,000+ unpatched domains (as of January 2026) provide ongoing opportunities for exploitation2
Organizations should treat React2Shell as a persistent threat requiring ongoing vigilance, not a one-time patch event. The vulnerability’s integration into criminal infrastructure, nation-state operations, and automated exploitation frameworks ensures it will remain a significant risk factor for years to come.
Takeaway
React2Shell mirrors Log4Shell’s long-term impact pattern: weaponization within hours, sustained
exploitation for years, and permanent toolkit integration. With 44% of cloud environments
exposing vulnerable React/Next.js instances and attack volumes stabilized (not declining), this
vulnerability will haunt unpatched systems indefinitely. Treat this as infrastructure risk, not a
temporary threat.
React Server Components represent a significant architectural shift. They blur the line between client and server code, which creates new attack surfaces that didn’t exist in traditional client-side React.
This vulnerability is a reminder that:
Server-side code needs server-side security thinking. RSC isn’t “just React”, it’s React running in a privileged environment.
Framework-level protections matter. Vercel’s ability to deploy WAF rules across their platform demonstrates the value of managed infrastructure.
The disclosure process is evolving. Coordinated disclosure with platform providers can protect users faster than traditional CVE → Dependabot → CI workflows.
Takeaway
React Server Components blur the client/server boundary, creating new attack surfaces. RSC
isn’t “just React”—it’s React running with server privileges. Apply server-side security thinking:
input validation, principle of least privilege, defense-in-depth, and coordinated disclosure with
platform providers.
Upgrade immediately—this is under active exploitation: Botnet integration confirmed, mass scanning ongoing, post-exploitation includes cryptomining and ransomware staging
Use Vercel’s fix tool for fastest remediation: npx fix-react2shell-next automates the upgrade process
WAF protection is defense-in-depth, not a complete fix: WAF cannot guarantee 100% coverage; bypasses exist and new variants emerge
Monitor for compromise using the detection patterns: PowerShell Event ID 4104, encoded commands, AMSI bypasses, unusual network connections
Enable Dependabot security updates: Same-day PRs for critical vulnerabilities are invaluable (when you actually merge them)
RSC introduces server-side attack surfaces: React Server Components blur client/server boundaries, creating new security considerations
Expect long-term exploitation: This vulnerability will be part of the threat landscape indefinitely—unpatched systems will be found
Don’t test POCs on production: Use version checks and log analysis instead of running exploits
This incident highlights several important lessons for DevSecOps teams:
Defense in depth works: Vercel’s WAF and Dependabot provided layered protection
Automated tooling is essential: Automated fix tools and dependency management speed remediation
Proactive monitoring is critical: Detection patterns help identify potential compromises quickly
Collaboration matters: Coordinated disclosure with platform providers enhances ecosystem security
GreyNoise. “CVE-2025-55182 (React2Shell) Opportunistic Exploitation In The Wild.” GreyNoise Intelligence, January 2026. greynoise.io; CyberSecurityNews. “Hackers Launched 8.1 Million Attack Sessions to React2Shell.” CyberSecurityNews, January 2026. cybersecuritynews.com
December 5, 2025 - 23:44 UTC: Vercel partners with HackerOne for responsible disclosure (25k−50k bounties)
The vulnerability affects React Server Components (RSC) broadly, including Server Components, Server Actions, and any RSC-based rendering pipeline. If you’re using Next.js App Router (13+), you’re using RSC and potentially affected.
SiteGuarding. “Critical React Server Components Vulnerability Exposes Over 644,000 Domains.” SiteGuarding Security Blog, January 2026. siteguarding.com; CybersecurityDive. “React Server Components crisis escalates.” CybersecurityDive, January 2026. cybersecuritydive.com
CISA. “Known Exploited Vulnerabilities Catalog.” Cybersecurity and Infrastructure Security Agency, December 2025. cisa.gov; Gopher Security. “CISA’s KEV Catalog Grows by 1,484 Vulnerabilities in 2025.” Gopher Security, December 2025. gopher.security
React Team. “Denial of Service and Source Code Exposure in React Server Components.” React Blog, December 2025. react.dev; The Hacker News. “New React RSC Vulnerabilities Enable DoS and Source Code Exposure.” The Hacker News, December 2025. thehackernews.com
AWS Security. “China-nexus cyber threat groups rapidly exploit React2Shell vulnerability.” AWS Security Blog, December 2025. aws.amazon.com; Google Cloud. “Multiple Threat Actors Exploit React2Shell (CVE-2025-55182).” Google Cloud Threat Intelligence, December 2025. cloud.google.com; Rescana. “CVE-2025-55182 React2Shell: Chinese APT Groups Exploit Critical React Server Components Vulnerability.” Rescana, December 2025. rescana.com
Huntress. “PeerBlight Linux Backdoor Exploits React2Shell CVE-2025-55182.” Huntress Blog, January 2026. huntress.com; The Hacker News. “React2Shell Vulnerability Actively Exploited to Deploy Linux Malware.” The Hacker News, December 2025. thehackernews.com; GBHackers. “PeerBlight Linux Malware Abuses React2Shell for Proxy Tunneling.” GBHackers, January 2026. gbhackers.com
Bitdefender. “Technical Advisory: React2Shell Critical Unauthenticated RCE in React.” Bitdefender Blog, December 2025. bitdefender.com; Talent500. “React2Shell: The Critical React Vulnerability Reshaping Frontend Security.” Talent500 Blog, December 2025. talent500.com
Mondoo. “How to Fix Critical React and Next.js Vulnerabilities.” Mondoo Blog, December 2025. mondoo.com
AWS Security. “China-nexus cyber threat groups rapidly exploit React2Shell vulnerability.” AWS Security Blog, December 2025. aws.amazon.com
CyberScoop. “Inside Vercel’s sleep-deprived race to contain React2Shell.” CyberScoop, December 2025. cyberscoop.com; The Hacker News. “React2Shell Exploitation Delivers Crypto Miners and New Malware.” The Hacker News, December 2025. thehackernews.com
The Hacker News. “Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation.” The Hacker News, December 2025. thehackernews.com
Cloudflare. “React2Shell and related RSC vulnerabilities threat brief.” Cloudflare Blog, December 2025. blog.cloudflare.com
Microsoft Security. “Defending against the CVE-2025-55182 (React2Shell) vulnerability.” Microsoft Security Blog, December 2025. microsoft.com
Dynatrace. “React2Shell CVE-2025-55182: What it is and what to do.” Dynatrace Blog, December 2025. dynatrace.com