24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
76.01%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 17 Posts
  • 14 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture

Missed this yesterday - Google TIG published what they've been seeing on React2Shell.

Dovetails with @hrbrmstr 's tireless work lately.

#threatintel

cloud.google.com/blog/topics/t

  • 3
  • 4
  • 0
  • 1h ago
Profile picture

VulnCheck analyzed several hundred CVE-2025-55182 exploits so you don't have to!

Amid all the slop (and there's so, so much slop) were some interesting finds that understandably escaped attention, including an early in-memory webshell variant, a PoC with logic that loads the Godzilla webshell, and a repo that deploys a lightweight WAF to block React2Shell payloads entirely (!)

@albinolobster wrote about exploit characteristics in aggregate and broke out the cooler examples here:

vulncheck.com/blog/react2shell

  • 2
  • 2
  • 0
  • 19h ago
Profile picture

Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide

Torrance, United States / California, 12th December 2025, CyberNewsWire

securityledger.com/2025/12/cri

  • 0
  • 0
  • 2
  • 23h ago
Profile picture

React2Shell exploitation now enables persistent access via EtherRAT’s blockchain-based C2.

technadu.com/react2shell-explo

• Unauthenticated RCE via CVE-2025-55182
• EtherRAT instructions hidden inside Ethereum smart contracts
• Gov + cloud + critical-infrastructure orgs selectively targeted
• Unique per-host payloads hinder signature detection
• Monitor Node.js anomalies + Ethereum RPC activity

  • 0
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture
個人開発のEC2が乗っ取られてMoneroを掘られていた話【CVE-2025-55182】|ねころこ https://note.com/nekoroko/n/n729421e1cf8d
  • 1
  • 0
  • 0
  • 13h ago
Profile picture
React2Shell is evolving into a persistence threat, with EtherRAT using Ethereum smart contracts as covert C2. • CVE-2025-55182 → unauthenticated RCE • Host-specific payloads evade signatures • Gov, cloud, and critical-infrastructure apps targeted #CyberSecurity #EtherRAT #ThreatIntel #NextJS
  • 0
  • 1
  • 0
  • 20h ago
Profile picture
The 0 Duplicate: How a Nextjs Pre-Auth RCE Hunt Reveals the Nuts and Bolts of Modern Bug Bounties + Video Introduction: In the high-stakes world of bug bounty hunting, not every critical finding results in a massive payout. A recent hunter's experience with CVE-2025-55182, a pre-authentication…
  • 0
  • 1
  • 0
  • 17h ago
Profile picture
CVE-2025-55182 (React2Shell) Opportunistic Exploitation In The Wild: What The GreyNoise Observation Grid Is Seeing So Far www.greynoise.io/blog/cve-202...
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
核彈級漏洞?請看CVE-2025-55182真實測驗分析
  • 0
  • 0
  • 0
  • 14h ago
Profile picture
https://qiita.com/KeppyNaushika/items/53936b0ef3f87104e398 Next.jsの脆弱性を放置した結果、暗号通貨マイナーが仕込まれた事例を紹介しています。 CVE-2025-55182の公開から2日後に攻撃を受け、RCEを許してしまった経緯が解説されています。 攻撃の流れ、被害状況、対策として有効だったと思われるものがまとめられています。
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
Multiple Threat Actors Exploit React2Shell (CVE-2025-55182) #googlecloud https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182/
  • 0
  • 0
  • 1
  • 11h ago
Profile picture
~Mandiant~ Multiple threat actors are exploiting the critical React2Shell RCE to deploy backdoors, tunnelers, and cryptominers. - IOCs: reactcdn. windowserrorapis. com, 82. 163. 22. 139, 45. 76. 155. 14 - #CVE202555182 #React #ThreatIntel
  • 0
  • 0
  • 0
  • 10h ago
Profile picture
piyolog.hatenadiary.jp/ent... React Server Componentsの脆弱性 CVE-2025-55182(React2Shell)についてまとめてみた。 - piyolog
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
かわいそうだけど参考になるのでありがたい。 「私の環境は Next.js 15.4.3 + React 19.1.0。ドンピシャで脆弱だった」 「攻撃者のMoneroウォレットアドレスも特定できたが、仮想通貨の匿名性により追跡は困難だ」 「発見したマルウェアはVirusTotalに提出済み」 「「VirusTotalで検出ゼロ=安全」ではない」 個人開発のEC2が乗っ取られてMoneroを掘られていた話【CVE-2025-55182】|ねころこ note.com/nekoroko/n/n...
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Google
  • Chrome

12 Dec 2025
Published
13 Dec 2025
Updated

CVSS
Pending
EPSS
23.28%

Description

Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 12 Posts
  • 43 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture

I see that Brendan Eich from Brave is out lying about @Vivaldi again. He claims that Brave was pretty much the first out with a fix for CVE-2025-14174 and that Vivaldi still has not released a fix.

AFAIK we were actually first because we released 7.7.3862.88 (Android) based on 142.0.7444.237 from the Extended Support Release branch at 13:00 UTC (and for Desktop [7.7.3851.61] one hour later) on the 10th of December (the day before Brave and even before Chrome), which includes a fix for CVE-2025-14174. However since that CVE was not being publicly discussed yet, it was not initially listed in the changelog.

I have updated the Desktop announcement to mention the CVE now. Here it is:

vivaldi.com/blog/desktop/minor

Also FWIW my Masto bot which tracks various desktop browser updates announced us here:

social.vivaldi.net/@browserver

That bot has a sibling that looks at Vivaldi only releases (all platforms), which caught the Android release:

social.vivaldi.net/@vivaldiver

And here is when it detected the Brave annoucement, more than a day later:

social.vivaldi.net/@browserver

  • 15
  • 9
  • 0
  • 5h ago
Profile picture

📣 EMERGENCY UPDATES 📣

Apple pushed additional updates for 2 zero-days that may have been actively exploited.

🐛 CVE-2025-14174 (WebKit) additional patches,
🐛 CVE-2025-43529 (WebKit) additional patches:
- Safari 26.2

  • 6
  • 5
  • 1
  • 18h ago
Profile picture

Two EITW 0days patched in iOS Webkit. The advisory says the exploits were against pre-iOS 26 but they have patches for 26 as well. And some other ones to go with those.

support.apple.com/en-us/125884

Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.

Processing maliciously crafted web content may lead to memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-43529 was also issued in response to this report.

  • 2
  • 3
  • 0
  • 18h ago
Profile picture

[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"

"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.

Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
macg.co/ios/2025/12/securite-a
⬇️
cve.circl.lu/vuln/CVE-2025-141

💬
⬇️
infosec.pub/post/38999452

  • 1
  • 0
  • 0
  • 2h ago
Profile picture

🚨 Two more vulnerabilities have been added to the CISA KEV Catalog

CVE-2018-4063: Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type

CVSS: 8.8

CVE-2025-14174: Google Chromium Out of Bounds Memory Access

CVSS: 8.8

darkwebinformer.com/cisa-kev-c

  • 0
  • 0
  • 0
  • 14h ago
Profile picture

Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware

In seguito alla scoperta di due vulnerabilità zero-day estremamente critiche nel motore del browser WebKit, Apple ha pubblicato urgentemente degli aggiornamenti di sicurezza per gli utenti di iPhone e iPad.

Entrambe le vulnerabilità risiedono in WebKit, il motore che alimenta Safari e visualizza i contenuti web nell’ecosistema iOS.

Catalogate come CVE-2025-43529 e CVE-2025-14174, permettono agli attaccanti di attivare codice malevolo attraverso l’inganno della vittima che viene portata a visitare una specifica pagina web.

Per attivare l’exploit, non è necessario che un aggressore abbia un accesso fisico al dispositivo; è sufficiente che venga elaborato un contenuto web creato in modo dannoso, ad esempio un sito web compromesso o una pubblicità dannosa.

L’avviso di Apple riporta quanto segue: “Apple è a conoscenza di una segnalazione secondo cui questo problema potrebbe essere stato sfruttato in un attacco estremamente sofisticato contro individui specifici nelle versioni di iOS precedenti a iOS 26″.

Questa formulazione è solitamente riservata alle campagne di spyware mercenarie sponsorizzate dallo Stato, in cui vengono presi di mira obiettivi di alto valore come giornalisti, diplomatici e dissidenti.

Le due falle sfruttano debolezze diverse nel modo in cui il browser gestisce la memoria:

CVE-2025-43529 (Use-After-Free): scoperta dal Google Threat Analysis Group (TAG), questa vulnerabilità comporta un errore “use-after-free”. In parole povere, il programma tenta di utilizzare la memoria dopo che è stata liberata, consentendo agli hacker di manipolarla per eseguire codice arbitrario. Apple ha risolto questo problema migliorando la gestione della memoria (WebKit Bugzilla: 302502).

CVE-2025-14174 (Corruzione della memoria): attribuito sia ad Apple che a Google TAG, questo problema consente la corruzione della memoria, una condizione che può causare il crash di un sistema o aprire una backdoor per gli aggressori. È stato corretto con una convalida dell’input migliorata (WebKit Bugzilla: 303614).

L'articolo Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 5h ago

Bluesky

Profile picture
~Cisa~ CISA added an actively exploited Google Chromium out-of-bounds memory access vulnerability (CVE-2025-14174) to its KEV catalog. - IOCs: CVE-2025-14174 - #CISA #CVE202514174 #ThreatIntel
  • 0
  • 0
  • 0
  • 10h ago
Profile picture
Apple issued security updates on December 13, 2025, addressing two WebKit vulnerabilities exploited in the wild. One flaw (CVE-2025-14174) is […]
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
📣 EMERGENCY UPDATES 📣 Apple pushed updates for 2 new zero-days that may have been actively exploited. 🐛 CVE-2025-14174 (WebKit), 🐛 CVE-2025-43529 (WebKit): - iOS and iPadOS 18.7.3 - iOS and iPadOS 26.2 - macOS Tahoe 26.2 - tvOS 26.2 - visionOS 26.2 - watchOS 26.2 #apple #infosec
  • 2
  • 0
  • 1
  • 19h ago
Profile picture
Apple’s Emergency Zero-Day Patch Reveals New Spyware Attack Surface—Are You Already Compromised? + Video Introduction: Apple has issued emergency security updates to patch two critical zero-day vulnerabilities (CVE-2025-43529 and CVE-2025-14174) exploited in what the company describes as an…
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Meta
  • react-server-dom-webpack

11 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
2.96%

KEV

Description

A pre-authentication denial of service vulnerability exists in React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints, which can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

Statistics

  • 6 Posts
  • 17 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture

Happy patch your React Server Components again Friday to all who celebrate. The patch for CVE-2025-55184 was incomplete and still leaves systems vulnerable to DoS.

facebook.com/security/advisori

It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

  • 7
  • 6
  • 0
  • 23h ago
Profile picture

Cloudforce One sees active exploitation of React2Shell, with actors targeting critical infrastructure—including nuclear fuel and uranium operations. Probing is concentrated in Taiwan, Xinjiang, Vietnam, Japan, and New Zealand.

React also disclosed two new vulnerabilities (CVE-2025-55183 and CVE-2025-55184). Cloudflare customers are protected against all three flaws.

Read the full threat brief: blog.cloudflare.com/react2shel

  • 1
  • 1
  • 0
  • 22h ago

Bluesky

Profile picture
The latest update for #AikidoSecurity includes "React & Next.js DoS Vulnerability (CVE-2025-55184): What You Need to Fix After React2Shell" and "#OWASP Top 10 for Agentic Applications (2026): What Developers and Security Teams Need to Know". #Cybersecurity #AppSec https://opsmtrs.com/48vGyRP
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
Critical RSC Flaws Exposed: How CVE-2025-55184 & CVE-2025-55183 Threaten Nextjs, React, and Your Entire Stack + Video Introduction: The React Server Components (RSC) paradigm, designed to enhance performance and developer experience in modern web frameworks, has become the latest attack vector for…
  • 0
  • 1
  • 0
  • 6h ago
Profile picture
💡 Summary: 2025年12月11日、Reactチームは最近のパッチ適用後に新たに発見されたReact Server Componentsの脆弱性を公表しました。これには、悪意のあるリクエストによってサーバーのハングを引き起こす高リスクのサービス拒否(Denial of Service、CVE-2025-55184、67779)や、サーバーの関数ソースコードを漏洩させる可能性のある中リスクのソースコード露出(CVE-2025-55183)が含まれます。既存のパッチは不完全であり、ユーザーは直ちに修正版(19.0.3、19.1.4、 (1/3)
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
~Socket~ New Denial of Service and Source Code Exposure vulnerabilities found in React Server Components require immediate patching. - IOCs: CVE-2025-55184, CVE-2025-67779, CVE-2025-55183 - #NextJS #React #ThreatIntel
  • 0
  • 1
  • 0
  • 9h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 8 Posts
  • 19 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture

📣 EMERGENCY UPDATES 📣

Apple pushed additional updates for 2 zero-days that may have been actively exploited.

🐛 CVE-2025-14174 (WebKit) additional patches,
🐛 CVE-2025-43529 (WebKit) additional patches:
- Safari 26.2

  • 6
  • 5
  • 1
  • 18h ago
Profile picture

Two EITW 0days patched in iOS Webkit. The advisory says the exploits were against pre-iOS 26 but they have patches for 26 as well. And some other ones to go with those.

support.apple.com/en-us/125884

Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.

Processing maliciously crafted web content may lead to memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-43529 was also issued in response to this report.

  • 2
  • 3
  • 0
  • 18h ago
Profile picture

[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"

"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.

Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
macg.co/ios/2025/12/securite-a
⬇️
cve.circl.lu/vuln/CVE-2025-141

💬
⬇️
infosec.pub/post/38999452

  • 1
  • 0
  • 0
  • 2h ago
Profile picture

Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware

In seguito alla scoperta di due vulnerabilità zero-day estremamente critiche nel motore del browser WebKit, Apple ha pubblicato urgentemente degli aggiornamenti di sicurezza per gli utenti di iPhone e iPad.

Entrambe le vulnerabilità risiedono in WebKit, il motore che alimenta Safari e visualizza i contenuti web nell’ecosistema iOS.

Catalogate come CVE-2025-43529 e CVE-2025-14174, permettono agli attaccanti di attivare codice malevolo attraverso l’inganno della vittima che viene portata a visitare una specifica pagina web.

Per attivare l’exploit, non è necessario che un aggressore abbia un accesso fisico al dispositivo; è sufficiente che venga elaborato un contenuto web creato in modo dannoso, ad esempio un sito web compromesso o una pubblicità dannosa.

L’avviso di Apple riporta quanto segue: “Apple è a conoscenza di una segnalazione secondo cui questo problema potrebbe essere stato sfruttato in un attacco estremamente sofisticato contro individui specifici nelle versioni di iOS precedenti a iOS 26″.

Questa formulazione è solitamente riservata alle campagne di spyware mercenarie sponsorizzate dallo Stato, in cui vengono presi di mira obiettivi di alto valore come giornalisti, diplomatici e dissidenti.

Le due falle sfruttano debolezze diverse nel modo in cui il browser gestisce la memoria:

CVE-2025-43529 (Use-After-Free): scoperta dal Google Threat Analysis Group (TAG), questa vulnerabilità comporta un errore “use-after-free”. In parole povere, il programma tenta di utilizzare la memoria dopo che è stata liberata, consentendo agli hacker di manipolarla per eseguire codice arbitrario. Apple ha risolto questo problema migliorando la gestione della memoria (WebKit Bugzilla: 302502).

CVE-2025-14174 (Corruzione della memoria): attribuito sia ad Apple che a Google TAG, questo problema consente la corruzione della memoria, una condizione che può causare il crash di un sistema o aprire una backdoor per gli aggressori. È stato corretto con una convalida dell’input migliorata (WebKit Bugzilla: 303614).

L'articolo Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 5h ago

Bluesky

Profile picture
📣 EMERGENCY UPDATES 📣 Apple pushed updates for 2 new zero-days that may have been actively exploited. 🐛 CVE-2025-14174 (WebKit), 🐛 CVE-2025-43529 (WebKit): - iOS and iPadOS 18.7.3 - iOS and iPadOS 26.2 - macOS Tahoe 26.2 - tvOS 26.2 - visionOS 26.2 - watchOS 26.2 #apple #infosec
  • 2
  • 0
  • 1
  • 19h ago
Profile picture
Apple’s Emergency Zero-Day Patch Reveals New Spyware Attack Surface—Are You Already Compromised? + Video Introduction: Apple has issued emergency security updates to patch two critical zero-day vulnerabilities (CVE-2025-43529 and CVE-2025-14174) exploited in what the company describes as an…
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Sierra Wireless

06 May 2019
Published
13 Dec 2025
Updated

CVSS
Pending
EPSS
4.29%

Description

An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Statistics

  • 3 Posts

Last activity: 1 hour ago

Fediverse

Profile picture

🚨 Two more vulnerabilities have been added to the CISA KEV Catalog

CVE-2018-4063: Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type

CVSS: 8.8

CVE-2025-14174: Google Chromium Out of Bounds Memory Access

CVSS: 8.8

darkwebinformer.com/cisa-kev-c

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture
~Cisa~ CISA added CVE-2018-4063, an actively exploited Sierra Wireless AirLink vulnerability, to its KEV catalog. - IOCs: CVE-2018-4063 - #CISA #CVE20184063 #ThreatIntel
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
Critical unrestricted file-upload vulnerability in Sierra Wireless AirLink ALEOS routers (CVE-2018-4063) allows authenticated attackers to achieve remote code execution.
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Meta
  • react-server-dom-webpack

11 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
MEDIUM (5.3)
EPSS
1.06%

KEV

Description

An information leak vulnerability exists in specific configurations of React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. A specifically crafted HTTP request sent to a vulnerable Server Function may unsafely return the source code of any Server Function. Exploitation requires the existence of a Server Function which explicitly or implicitly exposes a stringified argument.

Statistics

  • 5 Posts
  • 5 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture

Cloudforce One sees active exploitation of React2Shell, with actors targeting critical infrastructure—including nuclear fuel and uranium operations. Probing is concentrated in Taiwan, Xinjiang, Vietnam, Japan, and New Zealand.

React also disclosed two new vulnerabilities (CVE-2025-55183 and CVE-2025-55184). Cloudflare customers are protected against all three flaws.

Read the full threat brief: blog.cloudflare.com/react2shel

  • 1
  • 1
  • 0
  • 22h ago

Bluesky

Profile picture
Bypassing Cloudflare Walls: The React/Nextjs Source Code Leak (CVE-2025-55183) Exposed + Video Introduction: A critical vulnerability in React and Next.js applications, identified as CVE-2025-55183, has emerged, enabling threat actors to exfiltrate application source code. This flaw is…
  • 0
  • 1
  • 0
  • 20h ago
Profile picture
Critical RSC Flaws Exposed: How CVE-2025-55184 & CVE-2025-55183 Threaten Nextjs, React, and Your Entire Stack + Video Introduction: The React Server Components (RSC) paradigm, designed to enhance performance and developer experience in modern web frameworks, has become the latest attack vector for…
  • 0
  • 1
  • 0
  • 6h ago
Profile picture
💡 Summary: 2025年12月11日、Reactチームは最近のパッチ適用後に新たに発見されたReact Server Componentsの脆弱性を公表しました。これには、悪意のあるリクエストによってサーバーのハングを引き起こす高リスクのサービス拒否(Denial of Service、CVE-2025-55184、67779)や、サーバーの関数ソースコードを漏洩させる可能性のある中リスクのソースコード露出(CVE-2025-55183)が含まれます。既存のパッチは不完全であり、ユーザーは直ちに修正版(19.0.3、19.1.4、 (1/3)
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
~Socket~ New Denial of Service and Source Code Exposure vulnerabilities found in React Server Components require immediate patching. - IOCs: CVE-2025-55184, CVE-2025-67779, CVE-2025-55183 - #NextJS #React #ThreatIntel
  • 0
  • 1
  • 0
  • 9h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

09 Dec 2025
Published
12 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.16%

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.

Statistics

  • 2 Posts
  • 5 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture

PowerShell 5.1 now shows warnings when scripts use Invoke-WebRequest to fetch web content, aiming to limit silent script execution risks tied to CVE-2025-54100. ⚠️

Admins are urged to switch to -UseBasicParsing to avoid unintended code parsing and prevent automation hang-ups. 🛡️

🔗 bleepingcomputer.com/news/secu

#TechNews #Cybersecurity #Windows #PowerShell #Security #Privacy #InfoSec #Patch #Update #Automation #IT #DevOps #Risk #Technology #Development #Shell #Script #CVE #Vulnerability

  • 2
  • 3
  • 0
  • 22h ago

Bluesky

Profile picture
From Zero to Admin: How We Exploited CVE-2025-54100 for a ,000 Microsoft Bounty + Video Introduction: In the high-stakes world of cybersecurity, local privilege escalation (LPE) vulnerabilities represent a critical chokepoint for attackers seeking to dominate a network. The recent disclosure of…
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Pending

12 Dec 2025
Published
12 Dec 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Plesk 18.0 has Incorrect Access Control.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 13 hours ago

Fediverse

Profile picture

🔔 CRITICAL: Plesk 18.0 (CVE-2025-66430) suffers from incorrect access control, risking unauthorized admin actions. No exploit yet, but review roles, restrict access, and monitor logs ASAP. Patch pending. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Gladinet
  • CentreStack and TrioFox

12 Dec 2025
Published
12 Dec 2025
Updated

CVSS v4.0
HIGH (7.1)
EPSS
0.06%

KEV

Description

Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with previous vulnerabilities to gain a full system compromise.

Statistics

  • 2 Posts

Last activity: 11 hours ago

Fediverse

Profile picture

🔎 HIGH severity: CVE-2025-14611 in Gladinet CentreStack & TrioFox (<16.12.10420.56791) — hardcoded AES weakens crypto & enables unauth LFI. Restrict public access, monitor for LFI attempts, prep for patch. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Meta
  • react-server-dom-parcel

11 Dec 2025
Published
12 Dec 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.06%

KEV

Description

It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

Statistics

  • 2 Posts
  • 14 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture

Happy patch your React Server Components again Friday to all who celebrate. The patch for CVE-2025-55184 was incomplete and still leaves systems vulnerable to DoS.

facebook.com/security/advisori

It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

  • 7
  • 6
  • 0
  • 23h ago

Bluesky

Profile picture
~Socket~ New Denial of Service and Source Code Exposure vulnerabilities found in React Server Components require immediate patching. - IOCs: CVE-2025-55184, CVE-2025-67779, CVE-2025-55183 - #NextJS #React #ThreatIntel
  • 0
  • 1
  • 0
  • 9h ago
Showing 1 to 10 of 38 CVEs