24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
04 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.46%

KEV

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 63 Posts
  • 132 Interactions

Last activity: Last hour

Fediverse

Profile picture

🎅 🌲 💫

Weihnachtlich erstrahlen Gassen
Auf zum Einkauf hasten Massen
Drinnen leuchten Kerzen hell
Nur Systemadministratoren
Lauschen bang dem Netz-Rumoren
Horch! Es naht #React2Shell!

aws.amazon.com/de/blogs/securi

  • 8
  • 13
  • 0
  • 2h ago
Profile picture

To be clear, there are no public PoCs of yesterday's React vulnerability (CVE-2025-55182). The one that was being claimed as a POC has been outed as slop. Indeed, they even renamed the repo.

github.com/ejpir/CVE-2025-5518

The first PoCs for these vulns are now always fake.

Watch react2shell.com for disclosure from the discoverers.

  • 5
  • 3
  • 1
  • 18h ago
Profile picture

the bad news: lots of sloppity slop PoCs (slopocs???) abounding for the critical pre-auth React RCE

the good news: more time for you to patch your #React & #Nextjs apps ✨

my write up from yesterday on what to know & what to do: fastly.com/blog/fastlys-proact

  • 2
  • 16
  • 0
  • 20h ago
Profile picture

FML we have daft 10 IPs slinging the RSC/Next.js exploit along with one of the oddest JA4t hashes I've seen in a while.

someone(s) burned new infra to do so, too.

if any org gets compromised from an opportunistic campaign (like this) they fully deserve the ransomware/breach they get.

viz.greynoise.io/tags/react-se

  • 3
  • 2
  • 0
  • 6h ago
Profile picture

React Developers: There is a serious vulnerability in React and Next.JS (CVE-2025-55182 / CVE-2025-66478). It affects those using React for the BACKEND (RSC and React Server Functions). It is similar in damage and exploit to log4j. Please upgrade asap.

twp.ai/4isb7m

  • 14
  • 10
  • 0
  • 8h ago
Profile picture

Today in "AI ruins everything": AI generated "PoC" for the React RCE CVE-2025-55182, wasting countless defenders' hours, now get included in the CVE references. 🤦‍♂️

At least the co-author alongside the AI has updated the README now:
github.com/ejpir/CVE-2025-5518

Looks like the original reporter plans on posting more details at some point in the future here:
react2shell.com/

  • 2
  • 3
  • 0
  • 22h ago
Profile picture

PSA: There are automated attacks in the wild against CVE-2025-55182 (The react server components RCE made public yesterday)

Patch your systems NOW if you haven't yet.
:BoostOK:

  • 1
  • 2
  • 0
  • 2h ago
Profile picture

Cisco published a placeholder advisory for the React vuln CVE-2025-55182. They have not finished analyzing any of their products yet so impact has not been determined.

sec.cloudapps.cisco.com/securi

  • 0
  • 2
  • 0
  • 14h ago
Profile picture

Alleged (by Amazon) active exploitation of React Server Components (RSC) by Chinese threat actors. Has anyone else seen "real" exploitation attempts, not just running the fake PoCs that are out there?

aws.amazon.com/blogs/security/

#Vulnerabilities #ThreatIntel #React #CVE_2025_55182

  • 0
  • 2
  • 0
  • 5h ago
Profile picture

Concerned about the CVSS 10/10 React vuln? Datadog Security Research has put together an explainer covering everything you need to know.
securitylabs.datadoghq.com/art

  • 0
  • 1
  • 0
  • 15h ago
Profile picture
This PoC looks convincing enough (I didn't test though!):

https://github.com/msanft/CVE-2025-55182

CVE-2025-55182
  • 0
  • 0
  • 0
  • 21h ago
Profile picture

this week's conversations. unintentionally topical

#cve202555182

  • 0
  • 0
  • 0
  • 4h ago
Profile picture

⚠️ Alerte CERT-FR ⚠️

Le CERT-FR a connaissance de preuves de concept publiques pour la vulnérabilité CVE-2025-55182 affectant React Server Components et anticipe des exploitations en masse.

cert.ssi.gouv.fr/alerte/CERTFR

  • 0
  • 0
  • 1
  • 2h ago
Profile picture

the real React 10.0 CVE proof of concept (not the "AI" proof of slop)

github.com/lachlan2k/React2She

  • 0
  • 0
  • 0
  • 1h ago
Profile picture

Vulnerability Common Schema (replaces old CVE system)

{Product/module name or prefix}{severity number}{exploit type}

For example, CVE-2021-44228 becomes
Log4shell
CVE-2025-55182 becomes
React2shell

Simple.

  • 4
  • 5
  • 0
  • 10h ago
Profile picture

Una grave vulnerabilidad en React Server Components y Next.js permite ejecución remota de código sin autenticación, afectando versiones clave y exponiendo aplicaciones a ataques críticos. Se desarrolló un mecanismo de alta fidelidad para detectar estas amenazas, mientras expertos recomiendan actualizar y reforzar configuraciones para mitigar riesgos. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 05/12/25 📆 |====

🔐 VULNERABILIDAD CRÍTICA EN NEXT.JS Y REACT SERVER COMPONENTS QUE PERMITE EJECUCIÓN REMOTA DE CÓDIGO

Se ha detectado una falla de seguridad severa en las versiones 19.0.0 a 19.2.0 de React Server Components y en Next.js, que afecta la deserialización de cargas útiles HTTP sin autenticación previa. Esta vulnerabilidad, registrada como CVE-2025-55182 y CVE-2025-66478, tiene una calificación CVSS de 10.0 debido a su capacidad para ejecutar código remotamente, poniendo en riesgo aplicaciones que utilizan estos frameworks ampliamente adoptados. Es crucial que los desarrolladores y administradores de sistemas actualicen sus entornos y revisen sus configuraciones para mitigar posibles ataques que podrían comprometer la integridad y disponibilidad de sus servicios.

Descubre más detalles sobre esta amenaza y cómo proteger tus sistemas aquí 👉 djar.co/WTFvoc

🚨 ALERTA SOBRE LA EJECUCIÓN REMOTA DE CÓDIGO EN REACT SERVER COMPONENTS SIN NECESIDAD DE AUTENTICACIÓN

Los Componentes de Servidor React, entre las versiones mencionadas, presentan una vulnerabilidad que permite a un atacante remoto ejecutar código aprovechando una deserialización insegura de datos HTTP. La gravedad radica en la ausencia total de requerimientos de autenticación, facilitando así ataques sin barreras iniciales. Esta debilidad impacta directamente la seguridad de aplicaciones modernas basadas en React y Next.js, por lo que es imprescindible aplicar los parches recomendados y fortalecer los controles de acceso.

Consulta el análisis técnico y las recomendaciones para reforzar tu seguridad 👉 djar.co/6aBjG

⚠️ MECANISMO DE DETECCIÓN DE ALTA FIDELIDAD PARA RCE EN NEXT.JS Y REACT SERVER COMPONENTS

Se ha desarrollado un mecanismo avanzado para detectar intentos de ejecución remota de código (RCE) en Next.js y React Server Components, que permite identificar de manera precisa ataques aprovechando estas vulnerabilidades críticas. Además, se advierte sobre la proliferación de pruebas de concepto erróneas en repositorios públicos, enfatizando la necesidad de contar con detecciones fiables para evitar falsos positivos y responder efectivamente a incidentes reales.

Accede a la información detallada y la herramienta de detección aquí 👉 djar.co/u87j4H

🔥 IMPACTO Y MITIGACIONES DE LAS VULNERABILIDADES EN REACT Y NEXT.JS

Este análisis profundo aborda las consecuencias de las vulnerabilidades en componentes de React y Next.js, destacando la gravedad de permitir la ejecución remota de código y los posibles vectores de ataque. Se presentan también estrategias para mitigar estos riesgos, incluyendo actualizaciones, configuraciones seguras y prácticas recomendadas para desarrolladores, con el fin de preservar la integridad y confidencialidad de las aplicaciones.

Infórmate sobre las mejores prácticas y medidas preventivas aquí 👉 djar.co/wXxkh

  • 1
  • 1
  • 0
  • 1h ago
Profile picture

Critical RCE vulnerability (React2shell) found in React Server Components and Next.js. Affects many modern web apps. Patch immediately or deploy WAF rules. Exploitation is imminent.

redteamnews.com/red-team/cve/c

  • 0
  • 0
  • 0
  • 21h ago

Bluesky

Profile picture
CVE-2025-55182 (React2Shell): Remote code execution in React Server Components and Next.js securitylabs.datadoghq.com/articles/cve...
  • 4
  • 5
  • 0
  • 15h ago
Profile picture
> This vulnerability was disclosed as CVE-2025-55182 and is rated CVSS 10.0. — Critical Security Vulnerability in React Server Components – React https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components
  • 1
  • 0
  • 0
  • 21h ago
Profile picture
🧵 “React2Shell” (CVE-2025-55182): vulnerabilitat crítica CVSS 10.0 en React Server Components. Permet RCE no autenticat via deserialització insegura en el protocol “Flight”. Una sol·licitud HTTP maliciosa al servidor és suficient. Taxa d’èxit: ~100% en proves.
  • 0
  • 3
  • 0
  • 18h ago
Profile picture
"Protect against React RSC CVE-2025-55182 with Azure Web Application Firewall (WAF)" buff.ly/Me18DNz #Microsoft #techcommunity
  • 0
  • 1
  • 0
  • 18h ago
Profile picture
React2Shell Exposed: How a Single JSON Payload Can Own Your Nextjs Server Introduction: A critical remote code execution vulnerability, CVE-2025-55182 dubbed "React2Shell," has shaken the React ecosystem, specifically targeting React Server Components (RSC) and, by extension, Next.js applications.…
  • 0
  • 1
  • 0
  • 14h ago
Profile picture
CVE-2025-55182.http https://gist.github.com/maple3142/48bc9393f45e068cf8c90ab865c0f5f3
  • 0
  • 1
  • 0
  • 12h ago
Profile picture
🚨 React2Shell (CVE-2025-55182) - Critical (CSVV 10.0) Unauthenticated RCE in React ecosystem
  • 0
  • 1
  • 0
  • 6h ago
Profile picture
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) December 4, 2025, Amazon Web Services aws.amazon.com/blogs/securi... @awscloud.bsky.social
  • 0
  • 1
  • 0
  • 1h ago
Profile picture
Catastrophic React Flaw (CVE-2025-55182, CVSS 10.0) Allows Unauthenticated RCE on Next.js and Server Components
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
Vulnerabilità RCE critica CVE-2025-55182 in React Server Components espone applicazioni 19.x a rischi estremi. Patch disponibili, upgrade urgente richiesto. #Nextjs #rce #react www.matricedigitale.it/2025/12/04/c...
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
This PoC looks convincing enough (I didn't test though!): github.com -> CVE-2025-55182 Original->
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
🚨 On December 3, 2025, #Meta disclosed a critical unauthenticated RCE vulnerability affecting #React – a popular library for building modern web apps. CVE-2025-55182 has been assigned the maximum CVSS rating of 10.0. Find mitigation guidance and more in the Rapid7 blog: r-7.co/4rAf48q
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
Responding to CVE-2025-55182: Secure your React and Next.js workloads #patchmanagement
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
React Server Components Exposed: The Silent RCE Storm Crippling Modern Web Apps Introduction: A critical vulnerability, CVE-2025-55182, has shattered the security perimeter of React Server Components (RSC), a foundational architecture for modern React frameworks like Next.js. This flaw enables…
  • 0
  • 0
  • 1
  • 18h ago
Profile picture
Yesterday, a high-severity vulnerability was announced affecting React Server Components. We deployed a WAF rule to all beta websites to prevent exploitation. Read more: https://www.skip2.net/blog/security/CVE-2025-55182
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
React、Node.js の最大深刻度脆弱性が修正されました。早急にアップデートしてください (CVE-2025-55182) Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182) #HelpNetSecurity (Dec 4) www.helpnetsecurity.com/2025/12/04/r...
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
React4Shell の脆弱性: CVE-2025-55182 から Web サーバーを保護する React4Shell vulnerability: protecting web servers from CVE-2025-55182 #Kaspersky (Dec 4) www.kaspersky.com/blog/react4s...
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) aws.amazon.com/blogs/securi...
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
TYPHOONS HAVE ENTERED THE CHAT China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) | Amazon Web Services aws.amazon.com/blogs/securi...
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
New Scanner Released to Detect Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182) https://gbhackers.com/new-scanner-released-to-detect-exposed-reactjs-and-next-js-rsc-endpoints/
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
React Server Componentsの脆弱性(CVE-2025-55182)について https://www.jpcert.or.jp/newsflash/2025120501.html
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
The latest update for #ArcticWolf includes "CVE-2025-55182: Critical Remote Code Execution Vulnerability Found in React Server Components" and "How To Combat #AI-Enhanced Social Engineering Attacks". #cybersecurity #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
📌 Critical Unauthenticated RCE Vulnerability Reported in React Ecosystem (CVE-2025-55182) https://www.cyberhub.blog/article/16366-critical-unauthenticated-rce-vulnerability-reported-in-react-ecosystem-cve-2025-55182
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
Critical RCE in React 19: How the Flight Protocol Turns Your UI Server into a Hackers’ Shell Introduction: The paradigm of server-side rendering has taken a dangerous turn with the discovery of critical Remote Code Execution (RCE) vulnerabilities in React Server Components (CVE-2025-55182). This…
  • 0
  • 0
  • 0
  • 5h ago
Profile picture
Protect against React RSC CVE-2025-55182 with Azure Web Application Firewall (WAF) #patchmanagement
  • 0
  • 0
  • 0
  • 5h ago
Profile picture
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) | AWS Security Blog https://aws.amazon.com/jp/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/
  • 0
  • 0
  • 0
  • 5h ago
Profile picture
China-Nexus Hackers Actively Exploiting React2Shell Vulnerability (CVE-2025-55182) in the Wild: cybersecuritynews.com/china-nexus-...
  • 0
  • 0
  • 0
  • 4h ago
Profile picture
PoC Exploit released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182): cybersecuritynews.com/poc-exploit-...
  • 0
  • 0
  • 0
  • 4h ago
Profile picture
关于 CVE-2025-55182 的讨论已经持续两天了。青小蛙在社区中看到 @Fiend_FEARing 同学的预警帖:《重大漏洞预警:CVE-2025-55182(CVSS 10.0)影响 React Server Components》。 当时青小蛙就震惊了,满分 CVSS 10.0
  • 0
  • 0
  • 0
  • 4h ago
Profile picture
🚨 New plugin: React2ShellPlugin (CVE-2025-55182). React Server Components RCE vulnerability detection - Next.js applications affected by critical remote code execution vulnerabilities. Results: https://leakix.net/search?page=0&q=%2Bplugin%3AReact2ShellPlugin&scope=leak
  • 0
  • 0
  • 1
  • 4h ago
Profile picture
Beyond Signatures: How ProjectDiscovery’s Dual-Validation Nuclei Template is Rewriting the Rules of Exploit Detection Introduction: A novel Nuclei template for the recently disclosed CVE-2025-55182, a vulnerability in Next.js, is setting a new standard for reliable vulnerability scanning. Moving…
  • 0
  • 0
  • 0
  • 3h ago
Profile picture
朝起きたら、React・Next.js に重大脆弱性が発生!【CVE-2025-55182・66478】 https://zenn.dev/gymynnym/articles/1ffbae5a18b404
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
~Socket~ A critical unauthenticated RCE vulnerability (CVSS 10.0) affects React Server Components, requiring immediate patching. - IOCs: CVE-2025-55182 - #CVE202555182 #ReactJS #ThreatIntel
  • 0
  • 0
  • 0
  • Last hour
Profile picture
Legitimate proof-of-concept code for CVE-2025-55182 & CVE-2025-66478 dropped last night and the original researcher (lachlan2k) has published their own exploit code on GitHub. Affected versions need to be patched as soon as possible. More info: cvemon.intruder.io/cves/CVE-202... #React2Shell
  • 1
  • 2
  • 0
  • 2h ago
Profile picture
React2Shell Exposed: How a Nextjs RCE Shatters Cloud WAF Illusions and What You Must Do Now Introduction: A critical Remote Code Execution (RCE) vulnerability, dubbed React2Shell (CVE-2025-55182 & CVE-2025-66478), is actively threatening React Server Components (RSC) and Next.js applications.…
  • 0
  • 1
  • 0
  • 9h ago
Profile picture
React2shell: The 10/10 RCE That Turns Your React App into a Remote Shell (CVE-2025-55182 / CVE-2025-66478) Introduction: A pair of critical, maximum-severity (CVSS 10.0) Remote Code Execution vulnerabilities, dubbed "React2shell," have been discovered in React Server Components and the Next.js App…
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
Critical Vulnerabilities in React and Next.js: everything you need to know (CVE-2025-55182 and CVE-2025-66478) #appsec
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
【緊急】Next.js (CVE-2025-66478) / React (CVE-2025-55182) の脆弱性について https://zenn.dev/satoyoshi/articles/05389491886cac
  • 0
  • 0
  • 1
  • 7h ago
Profile picture
The latest update for #BitSight includes "Security Alert: CVE-2025-66478 & CVE-2025-55182 Next.js React Server Components Remote Code Execution" and "Paying the Ransom: A Short-Term Fix or Long-Term Risks?". #Cybersecurity #RiskManagement https://opsmtrs.com/43KoF0t
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
今日のZennトレンド 【緊急】Next.js (CVE-2025-66478) / React (CVE-2025-55182) の脆弱性について Next.jsとReact Server Componentsの通信プロトコルに、認証不要のリモートコード実行(RCE)を可能とする重大な脆弱性(CVSS 10.0)が発見されました。 これは土台であるReactの処理機構に起因し、標準構成で動作するほぼ全てのプロジェクトが影響を受けます。 認証ロジックが働く前に攻撃が成立するため、Next.jsとReact関連パッケージ全てを直ちに最新の修正バージョンへアップデートすることが急務です。
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Pending

Pending
Published
03 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This CVE is a duplicate of CVE-2025-55182.

Statistics

  • 12 Posts
  • 30 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture

React Developers: There is a serious vulnerability in React and Next.JS (CVE-2025-55182 / CVE-2025-66478). It affects those using React for the BACKEND (RSC and React Server Functions). It is similar in damage and exploit to log4j. Please upgrade asap.

twp.ai/4isb7m

  • 14
  • 10
  • 0
  • 8h ago
Profile picture

Una grave vulnerabilidad en React Server Components y Next.js permite ejecución remota de código sin autenticación, afectando versiones clave y exponiendo aplicaciones a ataques críticos. Se desarrolló un mecanismo de alta fidelidad para detectar estas amenazas, mientras expertos recomiendan actualizar y reforzar configuraciones para mitigar riesgos. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 05/12/25 📆 |====

🔐 VULNERABILIDAD CRÍTICA EN NEXT.JS Y REACT SERVER COMPONENTS QUE PERMITE EJECUCIÓN REMOTA DE CÓDIGO

Se ha detectado una falla de seguridad severa en las versiones 19.0.0 a 19.2.0 de React Server Components y en Next.js, que afecta la deserialización de cargas útiles HTTP sin autenticación previa. Esta vulnerabilidad, registrada como CVE-2025-55182 y CVE-2025-66478, tiene una calificación CVSS de 10.0 debido a su capacidad para ejecutar código remotamente, poniendo en riesgo aplicaciones que utilizan estos frameworks ampliamente adoptados. Es crucial que los desarrolladores y administradores de sistemas actualicen sus entornos y revisen sus configuraciones para mitigar posibles ataques que podrían comprometer la integridad y disponibilidad de sus servicios.

Descubre más detalles sobre esta amenaza y cómo proteger tus sistemas aquí 👉 djar.co/WTFvoc

🚨 ALERTA SOBRE LA EJECUCIÓN REMOTA DE CÓDIGO EN REACT SERVER COMPONENTS SIN NECESIDAD DE AUTENTICACIÓN

Los Componentes de Servidor React, entre las versiones mencionadas, presentan una vulnerabilidad que permite a un atacante remoto ejecutar código aprovechando una deserialización insegura de datos HTTP. La gravedad radica en la ausencia total de requerimientos de autenticación, facilitando así ataques sin barreras iniciales. Esta debilidad impacta directamente la seguridad de aplicaciones modernas basadas en React y Next.js, por lo que es imprescindible aplicar los parches recomendados y fortalecer los controles de acceso.

Consulta el análisis técnico y las recomendaciones para reforzar tu seguridad 👉 djar.co/6aBjG

⚠️ MECANISMO DE DETECCIÓN DE ALTA FIDELIDAD PARA RCE EN NEXT.JS Y REACT SERVER COMPONENTS

Se ha desarrollado un mecanismo avanzado para detectar intentos de ejecución remota de código (RCE) en Next.js y React Server Components, que permite identificar de manera precisa ataques aprovechando estas vulnerabilidades críticas. Además, se advierte sobre la proliferación de pruebas de concepto erróneas en repositorios públicos, enfatizando la necesidad de contar con detecciones fiables para evitar falsos positivos y responder efectivamente a incidentes reales.

Accede a la información detallada y la herramienta de detección aquí 👉 djar.co/u87j4H

🔥 IMPACTO Y MITIGACIONES DE LAS VULNERABILIDADES EN REACT Y NEXT.JS

Este análisis profundo aborda las consecuencias de las vulnerabilidades en componentes de React y Next.js, destacando la gravedad de permitir la ejecución remota de código y los posibles vectores de ataque. Se presentan también estrategias para mitigar estos riesgos, incluyendo actualizaciones, configuraciones seguras y prácticas recomendadas para desarrolladores, con el fin de preservar la integridad y confidencialidad de las aplicaciones.

Infórmate sobre las mejores prácticas y medidas preventivas aquí 👉 djar.co/wXxkh

  • 1
  • 1
  • 0
  • 1h ago
Profile picture

Critical RCE vulnerability (React2shell) found in React Server Components and Next.js. Affects many modern web apps. Patch immediately or deploy WAF rules. Exploitation is imminent.

redteamnews.com/red-team/cve/c

  • 0
  • 0
  • 0
  • 21h ago

Bluesky

Profile picture
CVE-2025-66478: RCE in React Server Components #patchmanagement
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
Legitimate proof-of-concept code for CVE-2025-55182 & CVE-2025-66478 dropped last night and the original researcher (lachlan2k) has published their own exploit code on GitHub. Affected versions need to be patched as soon as possible. More info: cvemon.intruder.io/cves/CVE-202... #React2Shell
  • 1
  • 2
  • 0
  • 2h ago
Profile picture
React2Shell Exposed: How a Nextjs RCE Shatters Cloud WAF Illusions and What You Must Do Now Introduction: A critical Remote Code Execution (RCE) vulnerability, dubbed React2Shell (CVE-2025-55182 & CVE-2025-66478), is actively threatening React Server Components (RSC) and Next.js applications.…
  • 0
  • 1
  • 0
  • 9h ago
Profile picture
React2shell: The 10/10 RCE That Turns Your React App into a Remote Shell (CVE-2025-55182 / CVE-2025-66478) Introduction: A pair of critical, maximum-severity (CVSS 10.0) Remote Code Execution vulnerabilities, dubbed "React2shell," have been discovered in React Server Components and the Next.js App…
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
Critical Vulnerabilities in React and Next.js: everything you need to know (CVE-2025-55182 and CVE-2025-66478) #appsec
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
【緊急】Next.js (CVE-2025-66478) / React (CVE-2025-55182) の脆弱性について https://zenn.dev/satoyoshi/articles/05389491886cac
  • 0
  • 0
  • 1
  • 7h ago
Profile picture
The latest update for #BitSight includes "Security Alert: CVE-2025-66478 & CVE-2025-55182 Next.js React Server Components Remote Code Execution" and "Paying the Ransom: A Short-Term Fix or Long-Term Risks?". #Cybersecurity #RiskManagement https://opsmtrs.com/43KoF0t
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
今日のZennトレンド 【緊急】Next.js (CVE-2025-66478) / React (CVE-2025-55182) の脆弱性について Next.jsとReact Server Componentsの通信プロトコルに、認証不要のリモートコード実行(RCE)を可能とする重大な脆弱性(CVSS 10.0)が発見されました。 これは土台であるReactの処理機構に起因し、標準構成で動作するほぼ全てのプロジェクトが影響を受けます。 認証ロジックが働く前に攻撃が成立するため、Next.jsとReact関連パッケージ全てを直ちに最新の修正バージョンへアップデートすることが急務です。
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Microsoft
  • Windows

26 Aug 2025
Published
05 Nov 2025
Updated

CVSS v3.0
HIGH (7.0)
EPSS
0.23%

KEV

Description

Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.

Statistics

  • 5 Posts

Last activity: Last hour

Fediverse

Profile picture

Microsoft “Mitigates” Windows LNK Flaw Exploited as Zero-Day
bleepingcomputer.com/news/micr
Microsoft has quietly implemented a mitigation for a high-severity Windows LNK vulnerability exploited as a zero-day by multiple state-aligned and cybercriminal groups. Tracked as CVE-2025-9491, the flaw enables attackers to embed malicious commands inside Windows Shell Link (.lnk) files, allowing malware deployment and persistence. Successful attacks still require user interaction, typically by enticing victims to open weaponized LNK files delivered in ZIP or similar archives.
The vulnerability arises from how Windows parses and displays LNK files. Threat actors abuse this behaviour by padding the Target field with whitespace to conceal malicious command-line arguments, enabling code execution while evading detection.
ACROS Security CEO and 0patch co-founder Mitja Kolsek observed that Microsoft altered LNK file handling in November’s updates, allowing users to view all characters in the Target field rather than truncating at 260 characters. While this change increases visibility, it does not remove malicious arguments or provide warnings to users when opening LNK files with extended Target strings. As a result, the underlying risk remains only partially mitigated.

  • 0
  • 0
  • 0
  • 20h ago
Profile picture

Era ora! Microsoft corregge vulnerabilità di Windows sfruttata da 8 anni

Microsoft ha silenziosamente corretto una vulnerabilità di Windows di vecchia data, sfruttata in attacchi reali per diversi anni. L’aggiornamento è stato rilasciato nel Patch Tuesday di novembre , nonostante l’azienda fosse stata in precedenza lenta nell’affrontare il problema. Questa informazione è stata rivelata da 0patch, che ha indicato che la falla era stata sfruttata attivamente da vari gruppi dal 2017.

Il problema, denominato CVE-2025-9491, riguarda la gestione da parte di Windows delle scorciatoie LNK. Un errore dell’interfaccia utente faceva sì che parte del comando incorporato nella scorciatoia rimanesse nascosta durante la visualizzazione delle sue proprietà. Ciò consentiva l’esecuzione di codice dannoso come file innocuo. Gli esperti hanno osservato che le scorciatoie erano progettate per ingannare gli utenti, utilizzando caratteri invisibili e mascherandosi da documenti.

I primi dettagli emersero nella primavera del 2025, quando i ricercatori segnalarono che questo meccanismo veniva utilizzato da undici gruppi sponsorizzati da stati provenienti da Cina, Iran e Corea del Nord per attività di spionaggio, furto di dati e attacchi finanziari.
Paesi di origine APT che hanno sfruttato ZDI-CAN-25373 (Fonte Trendmicro)
All’epoca, la falla era nota anche come ZDI-CAN-25373. Microsoft dichiarò all’epoca che il problema non richiedeva un’attenzione immediata, citando il blocco del formato LNK in molte applicazioni Office e gli avvisi visualizzati quando si tentava di aprire tali file.

HarfangLab ha successivamente segnalato che la vulnerabilità era stata sfruttata dal gruppo XDSpy per distribuire il malware XDigo in attacchi ai governi dell’Europa orientale. Nell’autunno del 2025, Arctic Wolf ha rilevato un’altra ondata di abusi, questa volta rivolta a gruppi online cinesi che prendevano di mira istituzioni diplomatiche e governative europee e utilizzavano il malware PlugX. Microsoft ha successivamente rilasciato un chiarimento, ribadendo di non considerare il problema critico a causa della necessità di intervento da parte dell’utente e della presenza di avvisi di sistema.

Secondo 0patch, il problema andava oltre il semplice nascondere la coda del comando. Il formato di collegamento consente stringhe lunghe fino a decine di migliaia di caratteri, ma la finestra delle proprietà mostrava solo i primi 260 caratteri, troncando il resto senza preavviso. Ciò ha permesso di nascondere una parte significativa del comando eseguito. Una correzione di terze parti di 0patch ha risolto il problema in modo diverso : aggiunge un avviso quando si tenta di aprire un collegamento con argomenti più lunghi di 260 caratteri.

Un aggiornamento Microsoft ha risolto il problema espandendo il campo Destinazione in modo che venga visualizzato l’intero comando, anche se supera il limite di lunghezza precedente.

Un rappresentante dell’azienda, contattato, non ha confermato direttamente il rilascio dell’aggiornamento, ma ha fatto riferimento alle raccomandazioni generali sulla sicurezza e ha assicurato che l’azienda continua a migliorare l’interfaccia e i meccanismi di sicurezza.

L'articolo Era ora! Microsoft corregge vulnerabilità di Windows sfruttata da 8 anni proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 23h ago

Bluesky

Profile picture
Microsoft corrige una falla de Windows LNK tras años de explotación activa. La vulnerabilidad en cuestión es CVE-2025-9491 (puntuación CVSS: 7.8/7.0) #ciberseguridad #cybersecurity www.linkedin.com/pulse/micros...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
Microsoft "mitigates" Windows LNK flaw exploited as zero-day (CVE-2025-9491) #patchmanagement
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
Microsoft Silently Patched CVE-2025-9491 - We Think Our Patch Provides More Security
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Apache Software Foundation
  • Apache Tika core
  • org.apache.tika:tika-core

04 Dec 2025
Published
04 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.

Statistics

  • 2 Posts
  • 7 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture

🚨 CVE-2025-66516 CRITICAL: XXE in Apache Tika core (v1.13–3.2.1), tika-pdf-module, tika-parsers. Exploitable via crafted PDF XFA files — risks data exfil & DoS. Patch to 3.2.2+ now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago
Profile picture

Perfect 10 XXE in Apache Tika tika-core. 🥳

lists.apache.org/thread/s5x3k9

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. \n\nThis CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. \n\nFirst, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. \n\nSecond, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the \"org.apache.tika:tika-parsers\" module.

cve.org/CVERecord?id=CVE-2025-

  • 3
  • 4
  • 0
  • 19h ago

Overview

  • Pending

04 Dec 2025
Published
04 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The unzip/extraction functionality improperly allows archive contents to be written to arbitrary locations on the filesystem due to insufficient validation of extraction paths.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture
  • 2
  • 2
  • 0
  • 21h ago

Overview

  • N-able
  • N-central

12 Nov 2025
Published
14 Nov 2025
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
0.62%

KEV

Description

The N-central Software Probe < 2025.4 is vulnerable to Remote Code Execution via deserialization

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 13 hours ago

Overview

  • Pending

04 Dec 2025
Published
04 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

An issue was discovered on Thermo Fisher Ion Torrent OneTouch 2 INS1005527 devices. They run an SSH server accessible over the default port 22. The root account has a weak default password of ionadmin, and a password change policy for the root account is not enforced. Thus, an attacker with network connectivity can achieve root code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture

I love seeing default creds in a CVE.

cve.org/CVERecord?id=CVE-2025-

An issue was discovered on Thermo Fisher Ion Torrent OneTouch 2 INS1005527 devices. They run an SSH server accessible over the default port 22. The root account has a weak default password of ionadmin, and a password change policy for the root account is not enforced. Thus, an attacker with network connectivity can achieve root code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

  • 1
  • 3
  • 0
  • 21h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 6
  • webkitgtk

04 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture

access.redhat.com/security/cve

A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.

  • 1
  • 2
  • 0
  • 19h ago

Overview

  • Google
  • Chrome

10 Nov 2025
Published
10 Nov 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Out of bounds read in WebXR in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture

⚠️ Alert: A #WebXR flaw (CVE-2025-12443) affected Chrome, Edge, Brave, Opera and other Chromium browsers - over 4 billion devices at risk. Patch pushed - update your browser now! 🔐

Read: hackread.com/webxr-flaw-chromi

#CyberSecurity #BrowserUpdate #Chromium #Chrome #Brave

  • 1
  • 1
  • 1
  • 23h ago

Overview

  • Linux
  • Linux

22 Aug 2025
Published
29 Sep 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: gfs2: No more self recovery When a node withdraws and it turns out that it is the only node that has the filesystem mounted, gfs2 currently tries to replay the local journal to bring the filesystem back into a consistent state. Not only is that a very bad idea, it has also never worked because gfs2_recover_func() will refuse to do anything during a withdraw. However, before even getting to this point, gfs2_recover_func() dereferences sdp->sd_jdesc->jd_inode. This was a use-after-free before commit 04133b607a78 ("gfs2: Prevent double iput for journal on error") and is a NULL pointer dereference since then. Simply get rid of self recovery to fix that.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 6 hours ago

Bluesky

Profile picture
CVE-2025-38659 gfs2: No more self recovery scq.ms/3KbMbil #cybersecurity #SecQube
  • 0
  • 1
  • 0
  • 6h ago
Showing 1 to 10 of 57 CVEs