24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
06 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
13.81%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 67 Posts
  • 87 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture

Yesterday, after various bogus AI slopped "PoC"s, eventually a functional PoC for the React RCE emerged:
github.com/msanft/CVE-2025-551

We now have a PoC from the reporter of the vulnerability as well:
github.com/lachlan2k/React2She

#react2shell

  • 14
  • 15
  • 0
  • 21h ago
Profile picture

I had the [mis?]fortune of being awake just as attackers decided to slam the public internet with React2Shell exploits. GreyNoise had a tag up for it yesterday afternoon.

Full write-up of the initial spate of attacks:
greynoise.io/blog/cve-2025-551
1/3

  • 6
  • 6
  • 0
  • 21h ago
Profile picture

Ooh @censys bringing the deets from the other perspective! censys.com/advisory/cve-2025-5

  • 2
  • 3
  • 0
  • 16h ago
Profile picture

React2Shell (CVE-2025-55182): Chinesische Hackergruppen greifen kritische React-Schwachstelle an
Wenige Stunden nach der Veröffentlichung der Schwachstelle CVE-2025-55182 am 3. Dezember 2025 registrierten Sicherheitsforscher von Amazon erste Angriffsversuche. Die unter dem Namen React2Shell bekannt gewordene Lücke erhielt die Höchstbewertung von 10.0 im CVSS-System und ermöglicht die Ausführung von Code ohne Authentifizierung.
all-about-security.de/react2sh

#cve #hackers #aws #cvss #cybersecurity

  • 0
  • 0
  • 0
  • 22h ago
Profile picture

Critical RSC Bugs in React and Next.js Enable Unauthenticated Remote Code Execution
Source: thehackernews.com/2025/12/crit
A maximum-severity flaw has been disclosed in React Server Components (RSC) that can allow remote code execution.
The vulnerability, CVE-2025-55182 — codenamed React2shell — carries a CVSS score of 10.0. According to the React team, it enables unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints.
The React team warns that applications may be vulnerable even if they do not implement Server Function endpoints, as long as they support React Server Components.
Cloud security firm Wiz reports that the issue stems from logical deserialization errors. RSC payloads are processed in an unsafe manner, allowing an attacker to send a specially crafted HTTP request to any Server Function endpoint. When the payload is deserialized, React may execute arbitrary JavaScript code on the server without authentication.

  • 0
  • 0
  • 0
  • 22h ago
Profile picture

📊 39% of cloud environments are vulnerable to React2Shell.

New data from Wiz indicates that nearly 40% of cloud environments contain instances vulnerable to CVE-2025-55182. Even more concerning? 44% of all cloud environments have publicly exposed Next.js instances.

The "secure by design" assumption is working against defenders right now.

✅ Detection is LIVE.

We have updated the Network Vulnerability Scanner in Pentest-Tools.com to help you validate this specific configuration immediately.

As shown in the attached video, you can go from "exposed" to "confirmed" in seconds:

1. Select the Network Scanner

2. Input CVE-2025-55182

3. Get definitive proof with Request/Response evidence

Don't rely on version checks when the exposure surface is this wide.

🔗 Run the detection: pentest-tools.com/network-vuln

📜 Vulnerability breakdown: pentest-tools.com/vulnerabilit

📈 Data source: wiz.io/blog/critical-vulnerabi

  • 0
  • 0
  • 0
  • 21h ago
Profile picture

React2Shell = Log4shell: 87.000 server in Italia a rischio compromissione

Nel 2025, le comunità IT e della sicurezza sono in fermento per un solo nome: “React2Shell“. Con la divulgazione di una nuova vulnerabilità, CVE-2025-55182, classificata CVSS 10.0, sviluppatori ed esperti di sicurezza di tutto il mondo ne mettono in guardia dalla gravità, utilizzando persino il termine “2025 Log4Shell”.

I server impattati da questa minaccia sono circa 8.777.000 nel mondo, mentre i server italiani sono circa 87.000. Questo fa comprendere, che con una severity da score 10, potrebbe essere una delle minacce più importante di tutto l’anno, che sta diventando “attiva”.

Il nuovo Log4Shell del 2025


Infatti, è stato confermato che la comunità hacker cinese che sono stati già avviati test di attacco su larga scala sfruttando l’exploit per la vulnerabilità in questione sui server esposti. il CVE-2025-55182 non è semplicemente un bug software. È una falla strutturale nel protocollo di serializzazione RSC, che consente lo sfruttamento con la sola configurazione predefinita, senza errori da parte degli sviluppatori. L’autenticazione non è nemmeno richiesta.

Ecco perché gli esperti di sicurezza di tutto il mondo lo chiamano “la versione 2025 di Log4Shell”. Lo strumento di scansione delle vulnerabilità React2Shell Checker sta analizzando più percorsi e alcuni endpoint sono contrassegnati come Sicuri o Vulnerabili. L’immagine sopra mostra che diversi ricercatori stanno già eseguendo scansioni automatiche sui server basati su RSC.

Il problema è che questi strumenti diventano armi che gli aggressori possono sfruttare. Gli hacker cinesi stanno conducendo con successo test RCE. Secondo i dati raccolti dalla comunità di hacker cinese, gli aggressori hanno già iniettato React2Shell PoC nei servizi basati su Next.js, raccolto i risultati con il servizio DNSLog e verificato il vettore di attacco.

L’Exploit PoC in uso nelle scansioni


Viene inviato un payload manipolato con Burp Repeater e il server crea un record DNS esterno. Ciò indica che l’attacco viene verificato in tempo reale. Gli aggressori hanno già completato i seguenti passaggi:

  • Carica il payload sul server di destinazione
  • Attiva la vulnerabilità di serializzazione RSC
  • Verifica il successo dell’esecuzione del comando con DNSLog esterno
  • Verifica la possibilità di eseguire child_process sul lato server.

Non si tratta più di una “vulnerabilità teorica”, bensì della prova che è già stato sviluppato un vettore di attacco valido.

Gli hacker cinesi stanno in questi istanti eseguendo con successo le RCE.

l PoC sono stati pubblicati su GitHub e alcuni ricercatori lo hanno eseguito, confermando che la Calcolatrice di Windows (Calc.exe) è stata eseguita in remoto.

L’invio del payload tramite BurpSuite Repeater ha comportato l’esecuzione immediata di Calc.exe sul server. Ciò significa che è possibile l’esecuzione completa del codice remoto.

L’esecuzione remota della calcolatrice è un metodo di dimostrazione comune nella comunità di ricerca sulla sicurezza di un “RCE” riuscito, ovvero quando un aggressore ha preso il controllo di un server.

Gli 87.000 server riportati nella print screen di FOFA, dimostrano che un numero significativo di servizi web di aziende italiane che operano con funzioni RSC basate su React/Next.js attivate sono a rischio. Il problema è che la maggior parte di essi

  • utilizza il rendering del server
  • mantiene le impostazioni predefinite di RSC
  • gestisce percorsi API esposti, quindi possono essere bersaglio di attacchi su larga scala.

In particolare, dato che i risultati della ricerca FOFA sono una fonte comune di informazioni utilizzata anche dai gruppi di hacker per selezionare gli obiettivi degli attacchi, è altamente probabile che questi server siano sotto scansioni attive.

Perché React2Shell è pericoloso?


Gli esperti definiscono questa vulnerabilità “senza precedenti” per i seguenti motivi:

  • RCE non autenticato (esecuzione di codice remoto non autenticato): l’aggressore non ha bisogno di effettuare l’accesso.
  • Possibilità Zero-Click: non è richiesta alcuna azione da parte dell’utente.
  • PoC immediatamente sfruttabile: già pubblicato in gran numero su GitHub e X.
  • Centinaia di migliaia di servizi in tutto il mondo si basano su React 19/Next.js: rischio di proliferazione su larga scala a livello della supply chain.
  • L’impostazione predefinita stessa è vulnerabile: è difficile per gli sviluppatori difenderla.

Questa combinazione è molto simile all’incidente Log4Shell del 2021.

Tuttavia, a differenza di Log4Shell, che era limitato a Java Log4j, React2Shell è più serio in quanto prende di mira i framework utilizzati dall’intero ecosistema globale dei servizi web.

I segnali di un attacco effettivo quali sono


Gli Aggressori stanno già eseguendo la seguente routine di attacco.

  • Raccolta di risorse di esposizione React/Next.js per paese da FOFA
  • Esecuzione dello script di automazione PoC di React2Shell
  • Verifica se il comando è stato eseguito utilizzando DNSLog
  • Sostituisci il payload dopo aver identificato i server vulnerabili
  • Controllo del sistema tramite RCE finale

Questa fase non è una pre-scansione, ma piuttosto la fase immediatamente precedente all’attacco. Dato il numero particolarmente elevato di server in Italia, la probabilità di attacchi RCE su larga scala contro istituzioni e aziende nazionali è molto alta. Strumenti di valutazione delle vulnerabilità e altri strumenti vengono caricati sulla comunità della sicurezza.

Mitigazione del bug di sicurezza


Gli esperti raccomandano misure di emergenza quali l’applicazione immediata di patch, la scansione delle vulnerabilità, l’analisi dei log e l’aggiornamento delle policy di blocco WAF.

Il team di React ha annunciato il 3 di aver rilasciato urgentemente una patch per risolvere il problema CVE-2025-55182, correggendo un difetto strutturale nel protocollo di serializzazione RSC. Tuttavia, a causa della natura strutturale di React, che non si aggiorna automaticamente, le vulnerabilità persistono a meno che aziende e organizzazioni di sviluppo non aggiornino e ricompilino manualmente le versioni.

In particolare, i servizi basati su Next.js richiedono un processo di ricostruzione e distribuzione dopo l’applicazione della patch di React, il che significa che probabilmente ci sarà un ritardo significativo prima che la patch di sicurezza effettiva venga implementata nell’ambiente del servizio. Gli esperti avvertono che “la patch è stata rilasciata, ma la maggior parte dei server è ancora a rischio”.

Molte applicazioni Next.js funzionano con RSC abilitato di default, spesso senza che nemmeno i team di sviluppo interni ne siano a conoscenza. Ciò richiede che le aziende ispezionino attentamente le proprie basi di codice per verificare l’utilizzo di componenti server e Server Actions. Con tentativi di scansione su larga scala già confermati in diversi paesi, tra cui la Corea, il rafforzamento delle policy di blocco è essenziale.

Inoltre, con la diffusione capillare di scanner automatici React2Shell e codici PoC in tutto il mondo, gli aggressori stanno eseguendo scansioni di massa dei server esposti anche in questo preciso momento. Di conseguenza, gli esperti di sicurezza hanno sottolineato che le aziende devono scansionare immediatamente i propri domini, sottodomini e istanze cloud utilizzando strumenti esterni di valutazione della superficie di attacco.

Hanno inoltre sottolineato che se nei log interni vengono rilevate tracce di chiamate DNSLog, un aumento di richieste POST multipart insolite o payload di grandi dimensioni inviati agli endpoint RSC, è molto probabile che si sia già verificato un tentativo di attacco o che sia stata raggiunta una compromissione parziale, il che richiede una risposta rapida.

L'articolo React2Shell = Log4shell: 87.000 server in Italia a rischio compromissione proviene da Red Hot Cyber.

  • 0
  • 0
  • 1
  • 21h ago
Profile picture

Gaur Cloudfront-i tokatu zaio. Berriro!

Dirudienez, akats oso larri bat aurkitu zuten "REACT" modulu batean (CVE10.0
cve.org/CVERecord?id=CVE-2025- ) eta erasoak ekiditeko... den-dena suntsitu dute ( blog.cloudflare.com/5-december )

Baina gaur oso gutxi iraun du etenaldia, ordu erdi besterik ez.
Gaur, badirudi onargarria dela.

Eskerrik asko Facebook :)
Eskerrik asko Cloudfront.

  • 0
  • 0
  • 0
  • 19h ago
Profile picture

Explanation and full RCE PoC for CVE-2025-55182 github.com/msanft/CVE-2025-551

  • 0
  • 0
  • 2
  • 16h ago
Profile picture

A critical vulnerability (CVE-2025-55182) in the React web application framework, allowing full remote code execution, is being actively exploited by Chinese state-nexus threat groups. The flaw, which affects all versions of React since November 2024, can be exploited remotely without authentication. Organizations using React or affected downstream frameworks are urged to remediate the vulnerability urgently.
govinfosecurity.com/chinese-na

  • 0
  • 0
  • 0
  • 16h ago
Profile picture

🚨 CVE-2025-55182: Meta React Server Components Remote Code Execution Vulnerability has been added to the CISA KEV Catalog

Added: 2025-12-05
Vendor: Meta
Product: React Server Components
CVSS: 10

CISA KEV Catalog: darkwebinformer.com/cisa-kev-c

Write-up: vulncheck.com/blog/cve-2025-55

  • 0
  • 0
  • 0
  • 15h ago
Profile picture

🚨 POC for CVE-2025-55182 that works on Next.js 16.0.6

x.com/i/status/199715855828332

  • 0
  • 0
  • 0
  • 8h ago
Profile picture

CISA has added CVE-2025-55182 (Meta React Server Components RCE) to the Known Exploited Vulnerabilities Catalog due to confirmed active exploitation.

Although BOD 22-01 applies only to federal agencies, CISA urges all organizations to prioritize KEV items within vulnerability management cycles.

How should teams weigh framework-level RCEs against broader infrastructure vulnerabilities?

Source: cisa.gov/news-events/alerts/20

💬 Share your perspective
🔁 Boost & Follow for more neutral cyber insights

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

🚨 CRITICAL: React2Shell (CVE-2025-55182, CVSS 10.0) is being exploited by Chinese APTs for unauth RCE in vulnerable React Server Components. Patch to 19.0.1/19.1.2/19.2.1 now! Watch for scanning, system discovery, & file writes. Details: radar.offseq.com/threat/chines

  • 0
  • 0
  • 0
  • 2h ago
Profile picture

New telemetry from AWS shows exploit attempts against React2Shell (CVE-2025-55182, CVSS 10) starting within hours of disclosure, coming from infrastructure associated with two long-tracked China-linked clusters. Activity includes discovery commands, file writes, and probing other N-days.

Cloudflare’s brief outage during mitigations further highlights how fast large platforms now respond to critical RCEs.

Source: thehackernews.com/2025/12/chin

💬 How do we realistically defend against same-day exploitation?
👍 Follow us for more detailed cyber reports.

  • 0
  • 0
  • 0
  • 1h ago
Profile picture

This Week in Security: React, JSON Formatting, and the Return of Shai Hulud

After a week away recovering from too much turkey and sweet potato casserole, we’re back for more security news! And if you need something to shake you out of that turkey-induced coma, React Server has a single request Remote Code Execution flaw in versions 19.0.1, 19.1.2, and 19.2.1.

The issue is insecure deserialization in the Flight protocol, as implemented right in React Server, and notably also used in Next.js. Those two organizations have both issued Security Advisories for CVSS 10.0 CVEs.

There are reports of a public Proof of Concept (PoC), but the repository that has been linked explicitly calls out that it is not a true PoC, but merely research into how the vulnerability might work. As far as I can tell, there is not yet a public PoC, but reputable researchers have been able to reverse engineer the problem. This implies that mass exploitation attempts are not far off, if they haven’t already started.

Legal AI Breaks Attorney-Client Privilege


We often cover security flaws that are discovered by merely poking around the source of a web interface. [Alex Schapiro] went above and beyond the call of duty, manually looking through minified JS, to discover a major data leak in the Filevine legal AI. And the best part, the problem isn’t even in the AI agent this time.

The story starts with subdomain enumeration — the process of searching DNS records, Google results, and other sources for valid subdomains. That resulted in a valid subdomain and a not-quite-valid web endpoint. This is where [Alex] started digging though Javascript, and found an Amazon AWS endpoint, and a reference to BOX_SERVICE. Making requests against the listed endpoint resulted in both boxFolders and a boxToken in the response. What are those, and what is Box?

Box is a file sharing system, similar to a Google Drive or even Microsoft Sharepoint. And that boxToken was a valid admin-level token for a real law firm, containing plenty of confidential records. It was at this point that [Alex] stopped interacting with the Filevine endpoints, and contacted their security team. There was a reasonably quick turnaround, and when [Alex] re-tested the flaw a month later, it had been fixed.

JSON Formatting As A Service


The web is full of useful tools, and I’m sure we all use them from time to time. Or maybe I’m the only lazy one that types a math problem into Google instead of opening a dedicated calculator program. I’m also guilty of pasting base64 data into a conversion web site instead of just piping it through base64 and xxd in the terminal. Watchtowr researchers are apparently familiar with such laziness efficiency, in the form of JSONformatter and CodeBeautify. Those two tools have an interesting feature: an online save function.

You may see where this is going. Many of us use Github Gists, which supports secret gists protected by long, random URLs. JSONformatter and CodeBeautify don’t. Those URLs are short enough to enumerate — not to mention there is a Recent Links page on both sites. Between the two sites, there are over 80,000 saved JSON snippets. What could possibly go wrong? Not all of that JSON was intended to be public. It’s not hard to predict that JSON containing secrets were leaked through these sites.

And then on to the big question: Is anybody watching? Watchtowr researchers beautified a JSON containing a Canarytoken in the form of AWS credentials. The JSON was saved with the 24 hour timeout, and 48 hours later, the Canarytoken was triggered. That means that someone is watching and collecting those JSON snippets, and looking for secrets. The moral? Don’t upload your passwords to public sites.

Shai Hulud Rises Again


NPM continues to be a bit of a security train wreck, with the Shai Hulud worm making another appearance, with some upgraded smarts. This time around, the automated worm managed to infect 754 packages. It comes with a new trick: pushing the pilfered secrets directly to GitHub repositories, to overcome the rate limiting that effected this worm the first time around. There were over 33,000 unique credentials captured in this wave. When researchers at GitGuardian tested that list a couple days later, about 10% were still valid.

This wave was launched by a PostHog credential that allowed a malicious update to the PostHog NPM package. The nature of Node.js means that this worm was able to very quickly spread through packages where maintainers were using that package. Version 2.0 of Shai Hulud also includes another nasty surprise, in the form of a remote control mechanism stealthily installed on compromised machines. It implies that this is not the last time we’ll see Shai Hulud causing problems.

Bits and Bytes


[Vortex] at ByteRay took a look at an industrial cellular router, and found a couple major issues. This ALLNET router has an RCE, due to CGI handling of unauthenticated HTTP requests. It’s literally just /cgi-bin/popen.cgi?command=whoami to run code as root. That’s not the only issue here, as there’s also a hardcoded username and password. [Vortex] was able to derive that backdoor account information and use hashcat to crack the password. I was unable to confirm whether patched firmware is available.

Google is tired of their users getting scammed by spam phone calls and texts. Their latest salvo in trying to defeat such scams is in-call scam protection. This essentially detects a banking app that is opened as a result of a phone call. When this scenario is detected, a warning dialogue is presented, that suggests the user hangs up the call, and forces a 30 second waiting period. While this may sound terrible for sophisticated users, it is likely to help prevent fraud against our collective parents and grandparents.

What seemed to be just an illegal gambling ring of web sites, now seems to be the front for an Advanced Persistent Threat (APT). That term, btw, usually refers to a government-sponsored hacking effort. In this case, instead of a gambling fraud targeting Indonesians, it appears to be targeting Western infrastructure. One of the strongest arguments for this claim is the fact that this network has been operating for over 14 years, and includes a mind-boggling 328,000 domains. Quite the odd one.

hackaday.com/2025/12/05/this-w…

  • 0
  • 0
  • 1
  • 21h ago
Profile picture

Progress Sitefinity Next.js Renderer appears to be vulnerable to this React vuln. React2Shell? Is that what everyone is calling it?

community.progress.com/s/artic

  • 0
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture
CVE-2025-55182 (React2Shell) attacks have begun. We are seeing broad automated exploitation, PoE math probes, encoded PS stagers, and AMSI bypass attempts, with botnets already adding the vuln. Patch fast. Watch your logs.
  • 3
  • 2
  • 1
  • 21h ago
Profile picture
Amazon researchers said they saw two Chinese state-backed groups - Earth Lamia and Jackpot Panda - exploiting React2Shell CISA also added it to the known exploited bugs list today as well Patch CVE-2025-55182 ASAP therecord.media/chinese-hack...
  • 2
  • 2
  • 1
  • 20h ago
Profile picture
React Server CVE-2025-55182 popping off in @greynoise.io right now. Blog from @hrbrmstr.dev up: www.greynoise.io/blog/cve-202...
  • 1
  • 4
  • 0
  • 19h ago
Profile picture
No surprise: We see hits of the React Vulnerability (CVE-2025-55182) against honeypots. The initial exploit attempts we are seeing originate from the following two IP addresses: 193.142.147.209 and 95.214.52.170. The payloads are: "ping -c 1 45.157.233.80" or "console.log('CVE-2025-55182-VULN')"
  • 1
  • 3
  • 0
  • 19h ago
Profile picture
React Server Components (CVE-2025-55182) RCE findings so far on 2025-12-05. 77664 IPs found vulnerable (based on Assetnote methodology). IP data is being shared in Vulnerable HTTP reports: www.shadowserver.org/what-we-do/n... Dashboard geo breakdown: dashboard.shadowserver.org/statistics/c...
  • 1
  • 3
  • 0
  • 2h ago
Profile picture
React2Shell (CVE-2025-55182, CVSS 10) is already seeing broad exploit attempts shortly after disclosure. AWS reports scanning, discovery commands, and efforts tied to long-tracked China-associated clusters. #React2Shell #CyberSecurity #ThreatIntel #InfoSec #AppSec #WebSecurity
  • 0
  • 3
  • 0
  • 1h ago
Profile picture
React2Shell: Your Nextjs App Is Actively Being Hacked Right Now (CVE-2025-55182) Introduction: A critical vulnerability in React Server Components, dubbed "React2Shell" (CVE-2025-55182), has escalated from proof-of-concept to widespread active exploitation. Threat actors are now deploying…
  • 0
  • 2
  • 0
  • 13h ago
Profile picture
React2Shell (CVE-2025-55182): Chinesische Hackergruppen greifen kritische React-Schwachstelle an www.all-about-security.de/react2shell-... #cyber #security #aws
  • 0
  • 1
  • 0
  • 22h ago
Profile picture
Cloudflare's global outage today was caused by an emergency patch for the critical #React2Shell vulnerability (CVE-2025-55182). This flaw allows remote code execution in React ap #CyberSecurity #Cloudflare #ReactJS snip.ly/m9u8ur
  • 0
  • 1
  • 0
  • 21h ago
Profile picture
React2Shell (CVE-2025-55182) で気付いた React Server Components のセキュリティの盲点 https://zenn.dev/storehero/articles/15636985eb876c
  • 0
  • 1
  • 0
  • 13h ago
Profile picture
~Trendmicro~ A critical pre-auth RCE (CVSS 10.0) vulnerability, CVE-2025-55182, affects React Server Components and frameworks like Next.js; patch immediately. - IOCs: CVE-2025-55182 - #CVE202555182 #ReactJS #ThreatIntel
  • 0
  • 1
  • 0
  • 8h ago
Profile picture
CISA has added CVE-2025-55182 (React Server Components RCE) to the Known Exploited Vulnerabilities Catalog after confirming active exploitation. CISA recommends all organizations prioritize remediation. #CyberSecurity #CISA #KEV #AppSec #Vulnerabilities #RCE #InfoSec #ThreatLandscape
  • 0
  • 1
  • 0
  • 3h ago
Profile picture
Chinese hackers (Earth Lamia, Jackpot Panda) are actively exploiting the React2Shell vulnerability (CVE-2025-55182) to target financial, logistics, and government sectors. Update React to versions 19.0.1, 19.1.2, or 19.2.1 immediately! #CyberSecurity #News
  • 0
  • 1
  • 0
  • 1h ago
Profile picture
React2Shell: How a Single React App Vulnerability Unleashes Total Server Compromise (CVE-2025-55182 Deep Dive) Introduction: The recent disclosure of CVE-2025-55182, dubbed "React2Shell," has sent shockwaves through the application security community. This critical vulnerability in the…
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
CVE-2025-55182: A Pre-Authentication Remote Code Execution in Next.js - Complete Guide https://medium.com/@P4RAD0X/cve-2025-55182-a-pre-authentication-remote-code-execution-in-next-js-complete-guide-e39a35fa3156?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
~Cisa~ CISA warns CVE-2025-55182, a Meta React Server Components RCE vulnerability, is being actively exploited. - IOCs: CVE-2025-55182 - #CVE202555182 #RCE #ThreatIntel
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
Two China-linked Hacking groups are exploiting a critical React Server Components vulnerability known as React2Shell (CVE-2025-55182). The vulnerability allows unauthenticated […]
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
Cisa aggiunge CVE-2025-55182 alla Kev list mentre Apache amplia vulnerabilità Tika, imponendo remediation urgente per ridurre rischi di Rce e parsing attacks. #ApacheTika #cisa #ReactServerComponents www.matricedigitale.it/2025/12/05/c...
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
My ex-wife-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) - Amazon Web Services (AWS)
  • 0
  • 0
  • 1
  • 17h ago
Profile picture
React2Shell: How a Single CVE-2025-55182 Nuclei Template Is Netting Bug Bounty Hunters Critical Finds Introduction: A critical server-side rendering vulnerability in React, tracked as CVE-2025-55182 and dubbed "React2Shell," is creating waves in the bug bounty community. This flaw allows for…
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
Earth LamiaやJackpot Panda等の中国の国家支援型ハッカーグループが、約5000万のウェブサイトや製品に組み込まれているReact Server Componentsの脆弱性React2Shell(CVE-2025-55182)を悪用している。 therecord.media/chinese-hack...
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
CVSS 10 avec POC - React2Shell, a CVSS 10.0 RCE Vulnerability in React Server Components (CVE-2025-55182) www.radware.com/security/thr...
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
We are seeing active exploitation of #React2Shell on our network. Our WAF protections are in place but the only way to permanently fix the vulnerability is to update your deployments. https://www.skip2.net/blog/security/CVE-2025-55182
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
ぐわ(;・∀・) React2Shell, CVE-2025-55182, CVE-2025-55182 「「React Server Functions」エンドポイントを実装していなくても、サーバーサイドでコンポーネントをレンダリングする「React Server Components」をサポートしている場合は脆弱になる可能性がある」 「React」「Next.js」に重大なリモートコード実行の脆弱性、CVSSの基本値は「10.0」 - 窓の杜 forest.watch.impress.co.jp/docs/news/20...
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
Critical React Server Components Vulnerability CVE-2025-55182: What Security Teams Need to Know www.trendmicro.com/en_us/resear...
  • 0
  • 0
  • 1
  • 10h ago
Profile picture
A global Cloudflare outage affecting major online services—including Zoom, LinkedIn, Coinbase, DoorDash, and Canva—was caused by emergency web application firewall (WAF) mitigations deployed in response to the critical React vulnerability known as React2Shell (CVE-2025-55182).
  • 0
  • 0
  • 0
  • 9h ago
Profile picture
The latest update for #Detectify includes "Security Update: Critical RCE in React Server Components & Next.js (CVE-2025-55182)" and "Why traditional black box #testing is failing modern #AppSec teams". #cybersecurity #webvulnerabilities #websecurity https://opsmtrs.com/33CTOVX
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
The latest update for #Harness includes "Protect Against Critical Unauthenticated RCE in React & Next.js (CVE-2025-55182) with Traceable WAF". #DevOps #CICD #AI https://opsmtrs.com/4hhDUoO
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
CVE-2025-55182 Unleashed: The Critical RCE Flaw and How Hackers Are Sneaking Past Your WAF Introduction: A recent disclosure by a bug bounty hunter has highlighted the active exploitation of a critical Remote Code Execution (RCE) vulnerability, CVE-2025-55182. This flaw, when chained with Web…
  • 0
  • 0
  • 0
  • 4h ago
Profile picture
The React RCE Nightmare: How CVE-2025-55182 Turns Your Frontend into a Backdoor Introduction: A critical zero-day Remote Code Execution vulnerability, identified as CVE-2025-55182 and dubbed "React2shell," has been publicly disclosed, demonstrating how a popular frontend framework can be…
  • 0
  • 0
  • 0
  • 4h ago
Profile picture
The Silent Browser Takeover: How a Chrome Extension Is Automatically Hacking Sites for You (CVE-2025-55182) Introduction: The React2shell vulnerability (CVE-2025-55182) has escalated from a critical code flaw to a weaponized, automated attack vector. A publicly available Chrome extension now…
  • 0
  • 0
  • 0
  • 3h ago
Profile picture
今日のZennトレンド React2Shell (CVE-2025-55182) で気付いた React Server Components のセキュリティの盲点 Next.jsなどのフレームワークにおけるReact Server Componentsの深刻な脆弱性(CVE-2025-55182/React2Shell)の概要、影響範囲、そして開発者が取るべき迅速なアップグレード対応について解説し、信頼できない入力処理のリスクと抽象化技術のセキュリティ上の盲点への注意を促す。
  • 0
  • 0
  • 0
  • 3h ago
Profile picture
📌 Analysis of CVE-2025-55182 and CVE-2025-66478: React and Next.js Vulnerabilities https://www.cyberhub.blog/article/16394-analysis-of-cve-2025-55182-and-cve-2025-66478-react-and-nextjs-vulnerabilities
  • 0
  • 2
  • 0
  • 16h ago
Profile picture
PoC: CVE-2025-55182 (React) y CVE-2025-66478 (Next.js) CVSS = *MEH* 👾
  • 0
  • 1
  • 0
  • 18h ago
Profile picture
Burp CVE-2025-55182CVE-2025-66478 React2Shell bambda
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
今日のZennトレンド 朝起きたら、React・Next.js に重大脆弱性が発生!【CVE-2025-55182・66478】 ReactおよびNext.jsにおいて、CVSSスコア10.0の極めて重大な脆弱性(CVE-2025-55182とCVE-2025-66478)が確認されました。 この脆弱性は、React Server Componentsプロトコルを悪用し、攻撃者にRCE(リモートコード実行)を可能とさせる深刻な脅威です。 開発者はウェブプロジェクトのセキュリティを確保するため、直ちに影響を受けるパッケージを修正済みバージョンへアップグレードする必要があります。
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
今日のZennトレンド 【緊急】Next.js (CVE-2025-66478) / React (CVE-2025-55182) の脆弱性について Next.jsとReact Server Components (RSC)に、認証不要でRCEを可能にする重大な脆弱性(CVSS 10.0)が発見されました。 これは基盤のReact RSCプロトコルにおけるデシリアライズ処理の欠陥が原因で、標準構成で広く影響が出ます。 最優先事項は、Next.jsとReactを修正済みバージョンに即時アップデートすることです。 さらにWAF導入など、恒久的な防御体制の強化が求められます。
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
The latest update for #JFrog includes "CVE-2025-55182 and CVE-2025-66478 ('React2Shell') – All you need to know" and "PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities". #cybersecurity #devops #CICD #Artifactory https://opsmtrs.com/3tbAFrI
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
https://zenn.dev/gymynnym/articles/1ffbae5a18b404 ReactとNext.jsに重大な脆弱性CVE-2025-55182およびCVE-2025-66478が発生しました。 この脆弱性により、攻撃者がRSCプロトコルを悪用してRCE攻撃を行う可能性があります。 影響を受ける方は、修正されたバージョンへのアップデートを推奨します。
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
Simulating and Detecting React2Shell: A Deep Dive into CVE-2025-55182 & CVE-2025-66478
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Pending

Pending
Published
03 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This CVE is a duplicate of CVE-2025-55182.

Statistics

  • 14 Posts
  • 17 Interactions

Last activity: 5 hours ago

Fediverse

Profile picture

🚨 CVE-2025-66478: Next.js RSC RCE Scanner and POC/Exploit Collection

A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability.

GitHub: github.com/Malayke/Next.js-RSC

  • 2
  • 3
  • 0
  • 18h ago
Profile picture

This Week in Security: React, JSON Formatting, and the Return of Shai Hulud

After a week away recovering from too much turkey and sweet potato casserole, we’re back for more security news! And if you need something to shake you out of that turkey-induced coma, React Server has a single request Remote Code Execution flaw in versions 19.0.1, 19.1.2, and 19.2.1.

The issue is insecure deserialization in the Flight protocol, as implemented right in React Server, and notably also used in Next.js. Those two organizations have both issued Security Advisories for CVSS 10.0 CVEs.

There are reports of a public Proof of Concept (PoC), but the repository that has been linked explicitly calls out that it is not a true PoC, but merely research into how the vulnerability might work. As far as I can tell, there is not yet a public PoC, but reputable researchers have been able to reverse engineer the problem. This implies that mass exploitation attempts are not far off, if they haven’t already started.

Legal AI Breaks Attorney-Client Privilege


We often cover security flaws that are discovered by merely poking around the source of a web interface. [Alex Schapiro] went above and beyond the call of duty, manually looking through minified JS, to discover a major data leak in the Filevine legal AI. And the best part, the problem isn’t even in the AI agent this time.

The story starts with subdomain enumeration — the process of searching DNS records, Google results, and other sources for valid subdomains. That resulted in a valid subdomain and a not-quite-valid web endpoint. This is where [Alex] started digging though Javascript, and found an Amazon AWS endpoint, and a reference to BOX_SERVICE. Making requests against the listed endpoint resulted in both boxFolders and a boxToken in the response. What are those, and what is Box?

Box is a file sharing system, similar to a Google Drive or even Microsoft Sharepoint. And that boxToken was a valid admin-level token for a real law firm, containing plenty of confidential records. It was at this point that [Alex] stopped interacting with the Filevine endpoints, and contacted their security team. There was a reasonably quick turnaround, and when [Alex] re-tested the flaw a month later, it had been fixed.

JSON Formatting As A Service


The web is full of useful tools, and I’m sure we all use them from time to time. Or maybe I’m the only lazy one that types a math problem into Google instead of opening a dedicated calculator program. I’m also guilty of pasting base64 data into a conversion web site instead of just piping it through base64 and xxd in the terminal. Watchtowr researchers are apparently familiar with such laziness efficiency, in the form of JSONformatter and CodeBeautify. Those two tools have an interesting feature: an online save function.

You may see where this is going. Many of us use Github Gists, which supports secret gists protected by long, random URLs. JSONformatter and CodeBeautify don’t. Those URLs are short enough to enumerate — not to mention there is a Recent Links page on both sites. Between the two sites, there are over 80,000 saved JSON snippets. What could possibly go wrong? Not all of that JSON was intended to be public. It’s not hard to predict that JSON containing secrets were leaked through these sites.

And then on to the big question: Is anybody watching? Watchtowr researchers beautified a JSON containing a Canarytoken in the form of AWS credentials. The JSON was saved with the 24 hour timeout, and 48 hours later, the Canarytoken was triggered. That means that someone is watching and collecting those JSON snippets, and looking for secrets. The moral? Don’t upload your passwords to public sites.

Shai Hulud Rises Again


NPM continues to be a bit of a security train wreck, with the Shai Hulud worm making another appearance, with some upgraded smarts. This time around, the automated worm managed to infect 754 packages. It comes with a new trick: pushing the pilfered secrets directly to GitHub repositories, to overcome the rate limiting that effected this worm the first time around. There were over 33,000 unique credentials captured in this wave. When researchers at GitGuardian tested that list a couple days later, about 10% were still valid.

This wave was launched by a PostHog credential that allowed a malicious update to the PostHog NPM package. The nature of Node.js means that this worm was able to very quickly spread through packages where maintainers were using that package. Version 2.0 of Shai Hulud also includes another nasty surprise, in the form of a remote control mechanism stealthily installed on compromised machines. It implies that this is not the last time we’ll see Shai Hulud causing problems.

Bits and Bytes


[Vortex] at ByteRay took a look at an industrial cellular router, and found a couple major issues. This ALLNET router has an RCE, due to CGI handling of unauthenticated HTTP requests. It’s literally just /cgi-bin/popen.cgi?command=whoami to run code as root. That’s not the only issue here, as there’s also a hardcoded username and password. [Vortex] was able to derive that backdoor account information and use hashcat to crack the password. I was unable to confirm whether patched firmware is available.

Google is tired of their users getting scammed by spam phone calls and texts. Their latest salvo in trying to defeat such scams is in-call scam protection. This essentially detects a banking app that is opened as a result of a phone call. When this scenario is detected, a warning dialogue is presented, that suggests the user hangs up the call, and forces a 30 second waiting period. While this may sound terrible for sophisticated users, it is likely to help prevent fraud against our collective parents and grandparents.

What seemed to be just an illegal gambling ring of web sites, now seems to be the front for an Advanced Persistent Threat (APT). That term, btw, usually refers to a government-sponsored hacking effort. In this case, instead of a gambling fraud targeting Indonesians, it appears to be targeting Western infrastructure. One of the strongest arguments for this claim is the fact that this network has been operating for over 14 years, and includes a mind-boggling 328,000 domains. Quite the odd one.

hackaday.com/2025/12/05/this-w…

  • 0
  • 0
  • 1
  • 21h ago
Profile picture

Progress Sitefinity Next.js Renderer appears to be vulnerable to this React vuln. React2Shell? Is that what everyone is calling it?

community.progress.com/s/artic

  • 0
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture
React2Shell-Ultimate Exposed: The Silent RCE Plague in Your Nextjs Apps & How to Neutralize It Now Introduction: A critical vulnerability, tracked as CVE-2025-66478 and colloquially dubbed "React2Shell," has emerged, targeting React.js and Next.js applications utilizing React Server Components…
  • 0
  • 1
  • 0
  • 7h ago
Profile picture
📌 Analysis of CVE-2025-55182 and CVE-2025-66478: React and Next.js Vulnerabilities https://www.cyberhub.blog/article/16394-analysis-of-cve-2025-55182-and-cve-2025-66478-react-and-nextjs-vulnerabilities
  • 0
  • 2
  • 0
  • 16h ago
Profile picture
PoC: CVE-2025-55182 (React) y CVE-2025-66478 (Next.js) CVSS = *MEH* 👾
  • 0
  • 1
  • 0
  • 18h ago
Profile picture
Burp CVE-2025-55182CVE-2025-66478 React2Shell bambda
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
今日のZennトレンド 朝起きたら、React・Next.js に重大脆弱性が発生!【CVE-2025-55182・66478】 ReactおよびNext.jsにおいて、CVSSスコア10.0の極めて重大な脆弱性(CVE-2025-55182とCVE-2025-66478)が確認されました。 この脆弱性は、React Server Componentsプロトコルを悪用し、攻撃者にRCE(リモートコード実行)を可能とさせる深刻な脅威です。 開発者はウェブプロジェクトのセキュリティを確保するため、直ちに影響を受けるパッケージを修正済みバージョンへアップグレードする必要があります。
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
今日のZennトレンド 【緊急】Next.js (CVE-2025-66478) / React (CVE-2025-55182) の脆弱性について Next.jsとReact Server Components (RSC)に、認証不要でRCEを可能にする重大な脆弱性(CVSS 10.0)が発見されました。 これは基盤のReact RSCプロトコルにおけるデシリアライズ処理の欠陥が原因で、標準構成で広く影響が出ます。 最優先事項は、Next.jsとReactを修正済みバージョンに即時アップデートすることです。 さらにWAF導入など、恒久的な防御体制の強化が求められます。
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
The latest update for #JFrog includes "CVE-2025-55182 and CVE-2025-66478 ('React2Shell') – All you need to know" and "PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities". #cybersecurity #devops #CICD #Artifactory https://opsmtrs.com/3tbAFrI
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
https://zenn.dev/gymynnym/articles/1ffbae5a18b404 ReactとNext.jsに重大な脆弱性CVE-2025-55182およびCVE-2025-66478が発生しました。 この脆弱性により、攻撃者がRSCプロトコルを悪用してRCE攻撃を行う可能性があります。 影響を受ける方は、修正されたバージョンへのアップデートを推奨します。
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
Simulating and Detecting React2Shell: A Deep Dive into CVE-2025-55182 & CVE-2025-66478
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Apache Software Foundation
  • Apache Tika core
  • org.apache.tika:tika-core

04 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.

Statistics

  • 6 Posts
  • 2 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture

A critical XXE bug (CVE-2025-66516) with a CVSS score of 10.0 has been discovered in Apache Tika, affecting multiple modules including tika-core, tika-pdf-module, and tika-parsers. This vulnerability allows attackers to perform XML External Entity injection via a crafted XFA file within a PDF, potentially leading to file system access and remote code execution, and requires urgent patching.
thehackernews.com/2025/12/crit

  • 0
  • 0
  • 0
  • 16h ago
Profile picture

⚠️ CRITICAL XXE bug (CVE-2025-66516, CVSS 10.0) in Apache Tika (tika-core, tika-pdf-module, tika-parsers). Exploitation via crafted PDFs can lead to file disclosure & RCE. Upgrade to 3.2.2+ ASAP! radar.offseq.com/threat/critic

  • 0
  • 0
  • 0
  • 7h ago
Profile picture

Vulnerabilità critica in Apache Tika con Severity 10! rischio di attacco XXE

E’ stata pubblicata una vulnerabilità critica in Apache Tika, che potrebbe consentire un attacco di iniezione di entità esterne XML, noto come XXE. La falla di sicurezza, catalogata come CVE-2025-66516, presenta un punteggio pari a 10,0 secondo la scala CVSS, indice di massima gravità.

Si ritiene che CVE-2025-66516 sia identica al CVE-2025-54988 (punteggio CVSS: 8,4), un’altra falla XXE nel framework di rilevamento e analisi dei contenuti, corretta dai responsabili del progetto nell’agosto 2025. Il nuovo CVE, ha affermato il team di Apache Tika, amplia la portata dei pacchetti interessati in due modi.

La falla critica è presente nei moduli Apache Tika, precisamente in tika-core (dalla versione 1.13 alla 3.2.1), tika-pdf-module (dalle versioni 2.0.0 alla 3.2.1) e tika-parsers (dalla 1.13 alla 1.28.5), su tutte le piattaforme, permette ad un aggressore di effettuare iniezioni di entità esterne XML attraverso un file XFA contraffatto incluso in un PDF.

Riguarda i seguenti pacchetti Maven:

  • org.apache.tika:tika-core >= 1.13,
  • org.apache.tika:tika-parser-pdf-module >= 2.0.0,
  • org.apache.tika:tika-parsers >= 1.13,

“Innanzitutto, sebbene il punto di ingresso della vulnerabilità fosse il modulo tika-parser-pdf, come riportato in CVE-2025-54988, la vulnerabilità e la sua correzione si trovavano in tika-core”, ha affermato il team. “Gli utenti che hanno aggiornato il modulo tika-parser-pdf ma non hanno aggiornato tika-core alla versione >= 3.2.2 sarebbero comunque vulnerabili”.

Alla luce della criticità della vulnerabilità, si consiglia agli utenti di applicare gli aggiornamenti il prima possibile per mitigare le potenziali minacce.

L'articolo Vulnerabilità critica in Apache Tika con Severity 10! rischio di attacco XXE proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 4h ago

Bluesky

Profile picture
The PDF Trap: Critical Vulnerability (CVE-2025-66516, CVSS 10.0) Hits Apache Tika Core
  • 1
  • 0
  • 0
  • 17h ago
Profile picture
Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 1
  • 0
  • 1h ago
Profile picture
📌 Critical XXE Vulnerability (CVE-2025-66516) Discovered in Apache Tika with Maximum CVSS Score https://www.cyberhub.blog/article/16407-critical-xxe-vulnerability-cve-2025-66516-discovered-in-apache-tika-with-maximum-cvss-score
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Apache Software Foundation
  • Apache HTTP Server

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Server-Side Request Forgery (SSRF) vulnerability  in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off  allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.66, which fixes the issue.

Statistics

  • 2 Posts
  • 5 Interactions

Last activity: 10 hours ago

Bluesky

Profile picture
Apache HTTP Server 2.4.66 Fixes SSRF Flaw (CVE-2025-59775) Exposing NTLM Hashes on Windows and suexec Bypass
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • util-linux

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.

Statistics

  • 1 Post
  • 8 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture

Hi, my name is cR0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000w

access.redhat.com/security/cve

  • 1
  • 7
  • 0
  • 19h ago

Overview

  • Langflow
  • Langflow

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
Pending

KEV

Description

Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 13 hours ago

Overview

  • Pending

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Authentication Bypass via Hardcoded Credentials GoAway up to v0.62.18, fixed in 0.62.19, uses a hardcoded secret for signing JWT tokens used for authentication.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 20 hours ago

Fediverse

Profile picture

Hardcoded JWT secret in something called GoAway. It appears to be a similar project to Pihole.

github.com/gian2dchris/CVEs/tr

  • 1
  • 3
  • 0
  • 20h ago

Overview

  • Edimax
  • BR-6478AC V3

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v4.0
MEDIUM (5.1)
EPSS
Pending

KEV

Description

A security vulnerability has been detected in Edimax BR-6478AC V3 1.0.15. This issue affects the function sub_416898 of the file /boafrm/formDebugDiagnosticRun. The manipulation of the argument host leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 20 hours ago

Overview

  • Array Networks
  • ArrayOS AG

05 Dec 2025
Published
06 Dec 2025
Updated

CVSS v3.1
HIGH (7.2)
EPSS
Pending

KEV

Description

Array Networks ArrayOS AG before 9.4.5.9 allows command injection, as exploited in the wild in August through December 2025.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture

EITW vuln in ArrayOS. Advisory was published Wednesday and updated today, along with the CVE being published, so IDK if it was 0day or quickly exploited after the advisory.

jpcert.or.jp/at/2025/at250024.

The DesktopDirect feature of the Array AG series provided by Array Networks contains a command injection vulnerability. If this vulnerability is exploited, an attacker may execute an arbitrary command. At the time of publication of this information, the CVE number for this vulnerability has not been numbered.

Not sure if this is something @Dio9sys and @da_667 are interested in.

Edit to add the CVE number since the description said it isn't available yet: CVE-2025-66644

  • 0
  • 2
  • 0
  • 17h ago

Overview

  • Oracle Corporation
  • Oracle Concurrent Processing

05 Oct 2025
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
74.07%

Description

Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 14 hours ago

Bluesky

Profile picture
CL0P/FIN11 didn’t ransom your files—they rented your memory. Oracle EBS via BI Publisher, “TLSv3.1” beacons, extortion later. Patch CVE-2025-61882 + lock egress. 🔥🧠 #AlphaHunt #CyberSecurity #CL0P #Ransomware
  • 0
  • 1
  • 0
  • 14h ago
Showing 1 to 10 of 50 CVEs