What's Happening?
A significant cybersecurity threat has emerged as a threat actor exploits vulnerable Next.js applications to compromise systems and exfiltrate credentials on a large scale. Cisco's Talos security researchers have identified this campaign, tracked as UAT-10608,
which leverages a critical React vulnerability known as React2Shell. This vulnerability, identified as CVE-2025-55182, allows remote, unauthenticated attackers to execute arbitrary code. The attackers use automated scanning to identify affected applications and employ the Nexus Listener framework to harvest credentials, cloud tokens, SSH keys, and environment secrets. At least 766 systems have been compromised, with over 10,000 files collected. The attackers' indiscriminate targeting pattern suggests the use of automated scanning tools to identify publicly reachable Next.js deployments.
Why It's Important?
The exploitation of the React2Shell vulnerability poses a significant threat to organizations using Next.js applications. The compromised credentials and sensitive data can lead to further security breaches, including supply chain attacks and lateral movement within networks. This campaign highlights the critical need for organizations to patch vulnerabilities promptly and secure their systems against automated scanning and exploitation. The exposure of sensitive information, such as AI platform keys, payment processor credentials, and cloud service tokens, underscores the potential for widespread impact on businesses and their operations. Organizations must prioritize cybersecurity measures to protect against such large-scale credential harvesting campaigns.
What's Next?
Organizations affected by this campaign need to take immediate action to mitigate the impact. This includes rotating all exposed credentials, keys, tokens, and secrets to prevent further compromise. Additionally, businesses should review their security protocols and ensure that all systems are updated with the latest patches to protect against known vulnerabilities. The cybersecurity community will likely continue to monitor the situation and provide guidance on best practices for securing Next.js applications and other vulnerable systems. Stakeholders, including IT departments and security teams, must remain vigilant and proactive in addressing potential threats.











