Attackers are utilizing the vulnerability to deploy malware and crypto-mining software, compromising server resources and perchance intercepting wallet interactions connected crypto platforms.
Updated Dec 16, 2025, 5:25 a.m. Published Dec 16, 2025, 5:25 a.m.
A critical vulnerability successful React Server Components is being actively exploited by aggregate menace groups, putting thousands of websites — including crypto platforms — astatine contiguous hazard with users perchance seeing each their assets drained, if impacted.
The flaw, tracked arsenic CVE-2025-55182 and nicknamed React2Shell, allows attackers to execute codification remotely connected affected servers without authentication. React’s maintainers disclosed the contented connected Dec. 3 and assigned it the highest imaginable severity score.
Shortly aft disclosure, GTIG observed wide exploitation by some financially motivated criminals and suspected state-backed hacking groups, targeting unpatched React and Next.js applications crossed unreality environments.
Loading...
What the vulnerability does
React Server Components are utilized to tally parts of a web exertion straight connected a server alternatively of successful a user’s browser. The vulnerability stems from however React decodes incoming requests to these server-side functions.
In elemental terms, attackers tin nonstop a specially crafted web petition that tricks the server into moving arbitrary commands, oregon efficaciously handing implicit power of the strategy to the attacker.
The bug affects React versions 19.0 done 19.2.0, including packages utilized by fashionable frameworks specified arsenic Next.js. Merely having the susceptible packages installed is often capable to let exploitation.
How attackers are utilizing it
The Google Threat Intelligence Group (GTIG) documented aggregate progressive campaigns utilizing the flaw to deploy malware, backdoors and crypto-mining software.
Some attackers began exploiting the flaw wrong days of disclosure to instal Monero mining software. These attacks softly devour server resources and electricity, generating profits for attackers portion degrading strategy show for victims.
Crypto platforms trust heavy connected modern JavaScript frameworks specified arsenic React and Next.js, often handling wallet interactions, transaction signing and licence approvals done front-end code.
If a website is compromised, attackers tin inject malicious scripts that intercept wallet interactions oregon redirect transactions to their ain wallets— adjacent if the underlying blockchain protocol remains secure.
That makes front-end vulnerabilities peculiarly unsafe for users who motion transactions done browser wallets.
More For You
Protocol Research: GoPlus Security

What to know:
- As of October 2025, GoPlus has generated $4.7M successful full gross crossed its merchandise lines. The GoPlus App is the superior gross driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol astatine $1.7M.
- GoPlus Intelligence's Token Security API averaged 717 cardinal monthly calls year-to-date successful 2025 , with a highest of astir 1 cardinal calls successful February 2025. Total blockchain-level requests, including transaction simulations, averaged an further 350 cardinal per month.
- Since its January 2025 motorboat , the $GPS token has registered implicit $5B successful full spot measurement and $10B successful derivatives measurement successful 2025. Monthly spot measurement peaked successful March 2025 astatine implicit $1.1B , portion derivatives measurement peaked the aforesaid period astatine implicit $4B.
More For You
Most Influential: Pavel Durov

The Telegram CEO whitethorn basal arsenic the astir pivotal fig successful the bona fide wide adoption of cryptocurrency.

5 hours ago









English (US)