LIVE NEWS
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
  • Elevance stock tumbles as CMS may halt Medicare enrollment
  • Wild spaces for butterflies to be created in Glasgow
  • You can now adjust how your caller card looks for calls on Android phones
  • TRON DAO expands TRON Academy initiative with Dartmouth, Princeton, Oxford, and Cambridge
  • Alex Mitchell: England scrum-half ruled out of Six Nations
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability
Cybersecurity

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

primereportsBy primereportsDecember 5, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email


A critical remote code execution vulnerability in React.js has been identified.

React.js is a JavaScript library for building fast, interactive user interfaces (UIs) using reusable components.

The security researcher Lachlan Davidson disclosed the vulnerability on 29 November 29, 2025, to the Meta team.

Officially tracked as CVE-2025-55182, the flaw has been dubbed React2Shell, a not-so-subtle nod the Log4Shell vulnerability which was discovered in 2021. It affects the server-side use of React.js and has been attributed the maximum severity rating (CVSS) of 10.0.

Separately, the Next.js team published a security advisory and reported their own CVE, CVE-2025-66478, on December 3. However, the US National Vulnerability Database (NVD) rejected this CVE as a duplicate of CVE-2025-55182.

React and Next.js are JavaScript frameworks that are used in many modern web applications, their widespread use is cause for concern.

Successful exploitation of React2Shell could provide an attacker with the ability to run arbitrary code and assume control of the victim server. This could lead to broad compromise of sensitive data. 

“The ubiquity of React and Next.js, along with their ease of exploitation, makes these bugs significant. Exploitation is incredibly simple and can be achieved without authentication”, commented Ari Eitan, director of cloud security research at Tenable.

“A single malicious HTTP request can trigger remote code execution on the server side, which makes the issue extremely harmful,” Eitan added.

Unlike many supply chain threats that affect rare configurations, this exploits the core deserialization logic of the framework itself and is exploitable in many cases.

According to researchers at software supply chain security firm JFrog, exploitation success rate is reported to be nearly 100% in default configurations.

React servers that use React Server Function endpoints are known to be vulnerable.

The Next.js web application is also vulnerable in its default configuration.

Exploitation of React2Shell Likely

At the time of writing, it is unknown if active exploitation has occurred however there have been some reports of observed exploitation activity as of December 5, 2026.

This situation is likely to evolve now the vulnerabilities have been publicly disclosed.

Also on December 5, at around 10am GMT, OX Security warned that the flaw is now actively exploitable.

In a LinkedIn post, the cybersecurity firm said, “Hacker maple3142 published a working PoC, and our team successfully verified it. This isn’t theoretical anymore. It results in unauthenticated remote code execution on vulnerable React and Next.js servers.”

JFrog said it has identified fake proof-of-concepts (PoC) on GitHub.

These types of projects are known to contain malicious code. Security teams must verify sources before testing, JFrog warned.

Immediate Remediation Recommendations

To resolve CVE-2025-55182 and CVE-2025-66478 security teams are urged to upgrade any vulnerable packages to the fixed ones which have been listed.

The vulnerability is present in versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of:

React said a fix was introduced in versions 19.0.1, 19.1.2, and 19.2.1. If any of the above packages are in use, these should be upgraded to any of the fixed versions immediately.

For Next.js apps, in cases where the App Router functionality is not heavily used, the web application may be migrated back to using the Pages Router by following the Next.js App Router migration guide.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWith Celestial AI Buy, Marvell Scales Up The Datacenter And Itself
Next Article Cyclone Ditwah kills over 600 – DW – 12/05/2025
primereports
  • Website

Related Posts

Cybersecurity

Samsung Unpacked 2026 live blog: Updates on Galaxy S26 Ultra, preorder deals, and pricing

February 25, 2026
Cybersecurity

Marquis sues SonicWall over backup breach that led to ransomware attack

February 25, 2026
Cybersecurity

Why ‘Call This Number’ TOAD Emails Beat Gateways

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.