React2Shell: Widespread Exploitation of Max-Score RCE (CVSS 10.0) by Espionage Groups and Miners
- Dec 13, 2025
- 2 min read
Key Findings
React2Shell (CVE-2025-55182), a critical vulnerability in React Server Components, was disclosed on December 3, 2025, carrying a maximum CVSS score of 10.0 and enabling unauthenticated remote code execution.
Shortly after disclosure, the Google Threat Intelligence Group (GTIG) observed widespread exploitation across various threat actor groups, ranging from opportunistic cybercriminals to suspected espionage groups.
Several distinct campaigns were identified, including:
The Tunnelers (UNC6600) deploying the MINOCAT tunneler
The "Legitimate" C2 (UNC6603) utilizing the HISONIC backdoor and legitimate cloud services for command and control
The Masqueraders (UNC6595) using ANGRYREBEL.LINUX malware disguised as the OpenSSH daemon
The Vim Impostor (UNC6588) distributing the COMPOOD backdoor masquerading as the Vim text editor
Background
The disclosure of CVE-2025-55182, known as React2Shell, has triggered a chaotic response in the cybersecurity landscape. As one of the world's most popular web development frameworks, the widespread adoption of React and Next.js has created a massive attack surface for this critical vulnerability.
Rapid Weaponization by China-Nexus Groups
Within hours of the public disclosure, China-nexus threat actors were observed actively exploiting the vulnerability. AWS detected exploitation attempts from groups like Earth Lamia and Jackpot Panda, targeting organizations across Latin America, the MENA region, and Southeast Asia.
Widespread Exploitation and Misinformation
The chaos was further compounded by a flood of misinformation, with the internet initially awash with fake exploits. One prominent repository had falsely claimed to have a legitimate and functional exploit, only to later update its README to acknowledge the claims were AI-generated and non-functional.
Ongoing Patching Efforts and Related Vulnerabilities
Organizations are urged to patch immediately, not just for the primary RCE flaw, but also for several follow-on vulnerabilities discovered in the aftermath. The rapid weaponization of this vulnerability highlights the need for robust vulnerability management and prompt patching to mitigate the risks posed by such critical flaws.
Sources
https://securityonline.info/react2shell-max-score-rce-cvss-10-0-triggers-widespread-exploitation-by-espionage-groups-miners/
https://cyble.com/blog/react2shell-cve-2025-55182-rapid-exploitation/


Comments