LIVE NEWS
  • At least six killed in Kyiv as gunman opens fire and takes hostages
  • What Is Q-Day? The Quantum Threat to Bitcoin Explained
  • Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks
  • My Friend Was 40 Years Older Than Me. She Changed How I See Life.
  • ‘No regrets’: Venezuela’s Machado defends giving Nobel medal to Trump | Donald Trump News
  • Stocks Soar on Middle East Peace Prospects
  • Air Force unit executes test of Anduril’s semiautonomous combat drone
  • 700-year-old mummy from Bolivia contains earliest confirmed evidence of strep throat bacteria in the Americas
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability
Cybersecurity

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

primereportsBy primereportsDecember 5, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email


A critical remote code execution vulnerability in React.js has been identified.

React.js is a JavaScript library for building fast, interactive user interfaces (UIs) using reusable components.

The security researcher Lachlan Davidson disclosed the vulnerability on 29 November 29, 2025, to the Meta team.

Officially tracked as CVE-2025-55182, the flaw has been dubbed React2Shell, a not-so-subtle nod the Log4Shell vulnerability which was discovered in 2021. It affects the server-side use of React.js and has been attributed the maximum severity rating (CVSS) of 10.0.

Separately, the Next.js team published a security advisory and reported their own CVE, CVE-2025-66478, on December 3. However, the US National Vulnerability Database (NVD) rejected this CVE as a duplicate of CVE-2025-55182.

React and Next.js are JavaScript frameworks that are used in many modern web applications, their widespread use is cause for concern.

Successful exploitation of React2Shell could provide an attacker with the ability to run arbitrary code and assume control of the victim server. This could lead to broad compromise of sensitive data. 

“The ubiquity of React and Next.js, along with their ease of exploitation, makes these bugs significant. Exploitation is incredibly simple and can be achieved without authentication”, commented Ari Eitan, director of cloud security research at Tenable.

“A single malicious HTTP request can trigger remote code execution on the server side, which makes the issue extremely harmful,” Eitan added.

Unlike many supply chain threats that affect rare configurations, this exploits the core deserialization logic of the framework itself and is exploitable in many cases.

According to researchers at software supply chain security firm JFrog, exploitation success rate is reported to be nearly 100% in default configurations.

React servers that use React Server Function endpoints are known to be vulnerable.

The Next.js web application is also vulnerable in its default configuration.

Exploitation of React2Shell Likely

At the time of writing, it is unknown if active exploitation has occurred however there have been some reports of observed exploitation activity as of December 5, 2026.

This situation is likely to evolve now the vulnerabilities have been publicly disclosed.

Also on December 5, at around 10am GMT, OX Security warned that the flaw is now actively exploitable.

In a LinkedIn post, the cybersecurity firm said, “Hacker maple3142 published a working PoC, and our team successfully verified it. This isn’t theoretical anymore. It results in unauthenticated remote code execution on vulnerable React and Next.js servers.”

JFrog said it has identified fake proof-of-concepts (PoC) on GitHub.

These types of projects are known to contain malicious code. Security teams must verify sources before testing, JFrog warned.

Immediate Remediation Recommendations

To resolve CVE-2025-55182 and CVE-2025-66478 security teams are urged to upgrade any vulnerable packages to the fixed ones which have been listed.

The vulnerability is present in versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of:

React said a fix was introduced in versions 19.0.1, 19.1.2, and 19.2.1. If any of the above packages are in use, these should be upgraded to any of the fixed versions immediately.

For Next.js apps, in cases where the App Router functionality is not heavily used, the web application may be migrated back to using the Pages Router by following the Next.js App Router migration guide.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWith Celestial AI Buy, Marvell Scales Up The Datacenter And Itself
Next Article Cyclone Ditwah kills over 600 – DW – 12/05/2025
primereports
  • Website

Related Posts

Cybersecurity

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

April 18, 2026
Cybersecurity

Google wipes out 602 million scam ads with Gemini on duty

April 18, 2026
Cybersecurity

The surveillance law Congress can’t quit — and can’t explain

April 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • At least six killed in Kyiv as gunman opens fire and takes hostages
  • What Is Q-Day? The Quantum Threat to Bitcoin Explained
  • Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.