React2Shell Lets Chinese Hackers Own Your Server. Patch Now

A max-severity flaw in React Server Components hands attackers full server control. China-nexus groups hit within hours of disclosure

Broken React logo with Chinese flag overlay
React2Shell turns your web app into a hacker's playground

Chinese state-linked groups like Earth Lamia and Jackpot Panda exploited CVE-2025-55182 in React Server Components within hours of its December 3 2025 disclosure. This unauthenticated RCE flaw gives attackers full server access without logins

React2Shell Hits with Perfect Storm Severity

CVE-2025-55182 struck on December 3 2025. It targets React Server Components in versions 19.0.0 19.1.0 19.1.1 and 19.2.0. The flaw lives in three packages: react-server-dom-webpack react-server-dom-parcel and react-server-dom-turbopack.

Unsafe deserialization lets unauthenticated attackers send crafted HTTP requests. Those requests trigger remote code execution on your server. No login needed. No privileges required. The CVSS score lands at 10.0. That means total catastrophe potential.

Researchers call it React2Shell. The name nods to Log4Shell the 2021 Log4j disaster that let attackers burrow into millions of systems. React powers your frontend. Billions of sites rely on it. One bad deserialization and attackers own the backend.

China-Nexus Hackers Strike First

Amazon CISO CJ Moses dropped the alert on December 4 2025. His teams spotted exploitation attempts hours after disclosure. Culprits: China state-nexus groups Earth Lamia and Jackpot Panda.

Earth Lamia hits financials logistics and governments in Latin America the Middle East and Southeast Asia. Jackpot Panda focuses on East and Southeast Asia. Both use shared Chinese anonymization nets. Attribution stays fuzzy but ASNs scream Chinese infrastructure.

Attackers blast automated scanners and public PoC exploits. Many PoCs flop but volume overwhelms. They pair React2Shell with other N-day hits like CVE-2025-1338 in NUUO cameras. Broad scans maximize weak spots. Your unpatched React server becomes low-hanging fruit.

Next.js Feels the Ripple

CVE-2025-66478 tracks the fallout in Next.js. It covers versions 15.0.4 15.1.8 15.2.5 15.3.5 15.4.7 15.5.6 and 16.0.6 with App Router enabled. The root cause mirrors React2Shell: insecure Flight protocol deserialization.

Next.js maintainers at Vercel pushed patches December 3 2025. Upgrade to 15.0.5 15.1.9 15.2.6 15.3.6 15.4.8 15.5.7 or 16.0.7. Wiz scans show 39 percent of cloud setups run vulnerable React or Next.js. 69 percent of those have Next.js. Your stack likely qualifies.

Vercel locked down hosted projects with WAF rules. Self-hosted setups get no such free ride. You patch or you pray.

Exploitation Wave Builds Fast

Cloudflare crashed briefly on December 5 2025. Their React2Shell WAF rollout overloaded the grid. Rapid7 confirmed a working PoC from researcher Lachlan Davidson the discoverer. More PoCs flood GitHub and exploit forums.

Broad attacks loom. Chinese groups industrialized this like Log4Shell. They scan the net dump payloads and pivot to credential theft or crypto mining. Wiz spotted post-exploit pivots to cloud creds. Your server turns into their launchpad.

React fixed it in 19.0.1 19.1.2 and 19.2.1. Released December 3 2025. Run npm update or yarn upgrade. Audit dependencies. Block Flight payloads at your edge if you lag.

Blackout VPN exists because privacy is a right. Your first name is too much information for us.

Keep learning

FAQ

What versions of React face React2Shell

Versions 19.0.0 19.1.0 19.1.1 and 19.2.0 in react-server-dom-webpack react-server-dom-parcel and react-server-dom-turbopack

How do Chinese groups exploit it

They send crafted HTTP requests to Server Function endpoints. Unsafe deserialization executes code without authentication

Is Next.js affected

Yes. Versions 15.0.4 through 15.5.6 and 16.0.6 with App Router inherit the flaw via CVE-2025-66478

When did exploitation start

Amazon detected attempts from China-nexus actors like Earth Lamia and Jackpot Panda within hours of December 3 2025 disclosure

How do you patch it

Upgrade React to 19.0.1 19.1.2 or 19.2.1 and Next.js to 15.0.5 15.1.9 15.2.6 15.3.6 15.4.8 15.5.7 or 16.0.7