New React bug that can drain all your tokens is impacting 'thousands of' websites

by Aric Feil

A first-rate vulnerability in React Server Parts is being actively exploited by multiple possibility groups, placing hundreds of websites — including crypto platforms — at instantaneous possibility with customers presumably seeing all their resources drained, if impacted.

The flaw, tracked as CVE-2025-55182 and nicknamed React2Shell, permits attackers to attain code remotely on affected servers without authentication. React’s maintainers disclosed the suppose on Dec. 3 and assigned it the very ideal that you might perhaps perhaps perhaps presumably presumably keep in mind severity gain.

At the moment after disclosure, GTIG observed frequent exploitation by both financially motivated criminals and suspected utter-backed hacking groups, concentrated on unpatched React and Subsequent.js applications across cloud environments.

Crypto Drainers the use of React CVE-2025-55182

We’re staring at a expansive uptick in drainers uploaded to reliable (crypto) websites through exploitation of the current React CVE.

All websites need to evaluate entrance-stop code for any suspicious resources NOW.

— Security Alliance (@_SEAL_Org) December 13, 2025

What the vulnerability does

React Server Parts are old to hasten parts of a web utility directly on a server as a replace of in a person’s browser. The vulnerability stems from how React decodes incoming requests to these server-aspect functions.

In easy terms, attackers can ship a particularly crafted web query that tricks the server into running arbitrary commands, or effectively handing over put an eye fixed on of the intention to the attacker.

The worm impacts React versions 19.0 through 19.2.0, including applications old by standard frameworks equivalent to Subsequent.js. Merely having the inclined applications installed is on the overall enough to permit exploitation.

How attackers are the use of it

The Google Possibility Intelligence Neighborhood (GTIG) documented multiple full of life campaigns the use of the flaw to deploy malware, backdoors and crypto-mining tool.

Some attackers began exploiting the flaw within days of disclosure to install Monero mining tool. These attacks quietly use server resources and electrical energy, generating earnings for attackers while degrading intention efficiency for victims.

Crypto platforms depend carefully on neatly-liked JavaScript frameworks equivalent to React and Subsequent.js, continuously handling pockets interactions, transaction signing and permit approvals through entrance-stop code.

If a web page is compromised, attackers can inject malicious scripts that intercept pockets interactions or redirect transactions to their very have wallets— even when the underlying blockchain protocol stays trusty.

That makes entrance-stop vulnerabilities particularly unhealthy for customers who mark transactions through browser wallets.

Related Posts