What's Happening?
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw, known as React2Shell, to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability, identified as CVE-2025-55182, has a CVSS score of 10.0
and allows for remote code execution by unauthenticated attackers. The flaw is found in Meta React Server Components and is due to insecure deserialization in the library's Flight protocol. This vulnerability affects several libraries, including react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack, as well as frameworks like Next.js and React Router. Reports indicate that Chinese hacking groups have already attempted to exploit this flaw, deploying cryptocurrency miners and other malicious payloads. CISA has mandated that Federal Civilian Executive Branch agencies apply necessary updates by December 26, 2025.
Why It's Important?
The inclusion of the React2Shell vulnerability in CISA's KEV catalog underscores the significant threat it poses to U.S. cybersecurity. With a CVSS score of 10.0, this flaw represents a severe risk, potentially allowing attackers to execute arbitrary commands on affected servers. The rapid exploitation attempts by multiple threat actors, including Chinese hacking groups, highlight the urgency for organizations to patch their systems. The vulnerability's impact on widely used frameworks like Next.js and React Router means that a large number of web services could be at risk, affecting businesses and government agencies alike. Addressing this vulnerability is crucial to prevent data breaches and maintain the integrity of critical infrastructure.
What's Next?
Organizations using affected React Server Components and related frameworks must prioritize updating to the latest versions to mitigate the risk of exploitation. Security researchers and companies are likely to continue monitoring for new attack vectors and exploitation attempts. CISA's directive for federal agencies to apply updates by December 26, 2025, sets a clear deadline for compliance, which may prompt similar actions in the private sector. As the cybersecurity community responds, further advisories and tools to detect and prevent exploitation may be developed.












