top of page

Exploitation of React2Shell Continues to Deliver Crypto Miners and New Malware Across Multiple Sectors

  • Dec 11, 2025
  • 2 min read

Key Findings


  • React2Shell vulnerability (CVE-2025-55182) in React version 19 and React Server Components (RSC) is being heavily exploited by threat actors

  • Exploitation attempts have been observed targeting a wide range of sectors, particularly construction and entertainment industries

  • Attackers are leveraging the vulnerability to deliver cryptocurrency miners and a variety of previously undocumented malware, including:

  • PeerBlight Linux backdoor

  • CowTunnel reverse proxy tunnel

  • ZinFoq Go-based post-exploitation implant


Background


React is a popular open-source library for building user interfaces, used by millions of websites and online services. The React2Shell vulnerability specifically impacts React version 19 and instances that leverage the recently introduced React Server Components (RSC) feature.


Security researchers discovered the critical remote code execution vulnerability, tracked as CVE-2025-55182, in early December 2025. Patches were quickly released by Meta, the maintainer of React, but exploitation efforts began almost immediately.


Exploitation Trends


  • Threat actors have been aggressively scanning for and targeting vulnerable React instances, with over 77,000 IPs identified as hosting vulnerable setups

  • Cloud security firm Wiz reported that 39% of the cloud environments it monitors include vulnerable React or Next.js versions

  • Exploitation attempts have been observed across multiple sectors, but construction and entertainment industries have been prominently targeted


Malware Payloads


Threat actors are leveraging the React2Shell vulnerability to deliver a variety of malware, including:


  • PeerBlight Linux backdoor

  • Communicates with a hard-coded C2 server and uses a domain generation algorithm (DGA) and BitTorrent Distributed Hash Table (DHT) network as fallback mechanisms

  • Capable of uploading/downloading/deleting files, spawning a reverse shell, modifying file permissions, running arbitrary binaries, and self-updating

  • CowTunnel reverse proxy tunnel

  • Initiates outbound connections to attacker-controlled Fast Reverse Proxy (FRP) servers, bypassing firewalls

  • ZinFoq Go-based post-exploitation implant

  • Supports a range of capabilities, including running commands, enumerating directories, downloading additional payloads, establishing reverse shells, and timestomping


The attackers have also been observed deploying cryptocurrency miners and other previously undocumented malware families on the compromised systems.


Attacker Tactics


  • Researchers assess that the threat actors are likely leveraging automated exploitation tooling, based on the consistent patterns observed across multiple endpoints

  • Attempts to deploy Linux-specific payloads on Windows endpoints suggest the automation does not differentiate between target operating systems

  • Attackers have been observed using publicly available tools to identify vulnerable Next.js instances before launching exploits


Sources


  • https://thehackernews.com/2025/12/react2shell-exploitation-delivers.html

  • https://www.securityweek.com/exploitation-of-react2shell-surges/amp/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page