VulnerAlert



CLOUD
FRAMEWORKS
JAVA
SDK
12-12-2025 05:52
Tags
#java
#frameworks
#hacker
#exploit
#critical
#server
#react
#next.js
#merge
#javascript
#html
#sdk
#cloud
#vulnerability
#affected
#arbitrary
#threat
#security
#patch
#privilege
#malicious
#issue
#inject
#execute
#critic
#allow
#attack
#affect
Descripción
React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation. critical vulnerability, tracked as CVE-2025-55182 (CVSS score: 10.0), affects React Server Components (RSC) Flight protocol. underlying cause issue is an unsafe deserialization that allows attacker inject malicious logic server executes in a privileged context. It also other frameworks, including Next.js, Waku, Vite, Router, RedwoodSDK. "A single, specially crafted HTTP request sufficient; there no authentication requirement, user interaction, or elevated permissions involved," Cloudforce One, Cloudflare's threat intelligence team, said . "Once successful, can execute arbitrary, JavaScript on affected server." Since its public disclosure 3, shortcoming... https://thehackernews.com/2025/12/react2shell-exploitation-escalates-into.html
CVE-2025-55182
Link externo
Ver detalles

Fuente
https://thehackernews.com/2025/12/react2shell-exploitation-escalates-into.html
Resultados similares
Coincidentes en almenos en 50% de los tags
13-12-2025 CVE-2025-36751
Encryption is missing on the configuration interface for Growatt ShineLan-X and MIC 3300TL-X....
Ver información
12-12-2025 CVE-2025-65828
An unauthenticated attacker within proximity of the Meatmeet device can issue several commands ...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por