#cve_2025_55182
📢 Next.js/NextAuth : forger des cookies d’authentification via le NEXTAUTH_SECRET
📝 Dans un billet technique publié le 14 janvier 2026, l’auteur détaill…
https://cyberveille.ch/posts/2026-01-16-next-js-nextauth-forger-des-cookies-dauthentification-via-le-nextauth-secret/ #CVE_2025_55182 #Cyberveille
January 16, 2026 at 7:30 PM
📢 React2Shell (CVE-2025-55182) exploité pour déployer le ransomware Weaxor
📝 Source: S-RM — Dans un rapport d’incident, S-RM décrit l’exploitation de la vulné…
https://cyberveille.ch/posts/2025-12-16-react2shell-cve-2025-55182-exploite-pour-deployer-le-ransomware-weaxor/ #CVE_2025_55182 #Cyberveille
December 16, 2025 at 10:00 PM
📢 React2Shell (CVE-2025-55182) : GreyNoise observe une exploitation opportuniste à grande échelle
📝 Source et contexte: GreyNoise publie …
https://cyberveille.ch/posts/2025-12-10-react2shell-cve-2025-55182-greynoise-observe-une-exploitation-opportuniste-a-grande-echelle/ #CVE_2025_55182 #Cyberveille
December 10, 2025 at 8:30 AM
📢 Exploitation éclair de React2Shell (CVE-2025-55182) ciblant React/Next.js par des groupes liés à la Chine
📝 Source: cyble.c…
https://cyberveille.ch/posts/2025-12-08-exploitation-eclair-de-react2shell-cve-2025-55182-ciblant-react-next-js-par-des-groupes-lies-a-la-chine/ #CVE_2025_55182 #Cyberveille
December 8, 2025 at 11:00 PM
Chinese Hackers & the React2Shell Crisis
Chinese Hackers & the React2Shell Crisis This week, we dive deep into the critical, maximum-severity security flaw known as React2Shell (tracked as CVE-2025-55182). This vulnerability, which impacts React, the widely-used open-source JavaScript library, allows for unauthenticated remote code execution (RCE) through specially crafted HTTP requests on affected servers. The episode explores the immediate aftermath of the disclosure. Exploitation attempts began quickly, with Amazon Web Services (AWS) reporting that multiple China-linked threat groups, specifically Earth Lamia and Jackpot Panda, were exploiting the flaw within hours of its public availability. These actors are using both automated tools and individual exploits, and some are even actively debugging and refining their techniques against live targets. Earth Lamia has been active since at least 2023, targeting various industries in Latin America, the Middle East, and Southeast Asia, while Jackpot Panda focuses on cyberespionage operations in Asia. We also discuss the significant collateral damage caused by the urgent need to patch this flaw. Internet infrastructure giant Cloudflare experienced a widespread global outage, returning "500 Internal Server Error" messages worldwide, and attributed the incident to an emergency patch deployed to mitigate the industry-wide React2Shell vulnerability. This change was related to how Cloudflare’s Web Application Firewall parsed requests. Finally, we clarify the scope of the vulnerability: React2Shell primarily impacts server-side components. Specifically, it affects React versions 19.0, 19.1.0, 19.1.1, and 19.2.0, particularly instances using a relatively new server feature. Standard React Native mobile apps are generally safe, but any backend built using Next.js (App Router) or React 19 Server Components that communicates with the mobile app is at critical risk. Furthermore, developers need to be aware of a separate, but timely, vulnerability (CVE-2025-11953) affecting the local React Native CLI development server. Key Concepts and Takeaways - Vulnerability: React2Shell, CVE-2025-55182, is a critical vulnerability allowing unauthenticated remote code execution on affected servers. - Scope: Impacts the React open-source JavaScript library, particularly React version 19 and dependent React frameworks such as Next.js (App Router). Cloud security giant Wiz reported that 39% of cloud environments contain vulnerable React instances. - Threat Actors: Exploitation is linked to China-linked threat groups, including Earth Lamia and Jackpot Panda. - Major Impact: An emergency mitigation patch designed to address React2Shell caused a widespread global outage at Cloudflare. - Fix: Patches were available shortly after disclosure, reported to Meta on November 29 and patched on December 3. Users must upgrade affected dependencies like react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack to version 19.0.1 or higher. Resources and Links - SecurityWeek (Source Context): (Note: Specific articles discussed are embedded within the episode content.) - Expo Changelog: For specific SDK patch instructions. - Sponsor Link: Protecting mobile app integrity against security threats is vital: https://approov.io/podcast Keywords (Optimized for SEO) React2Shell, , Remote Code Execution (RCE), China-linked hackers, Earth Lamia, Jackpot Panda, React Server Components (RSC), Next.js vulnerability, React 19 security, web security, patch management, cyber espionage, critical vulnerability, application security
www.spreaker.com
December 8, 2025 at 10:40 PM
📢 AWS alerte: des groupes liés à Pékin exploitent déjà la faille critique React React2Shell (CVE-2025-55182)
📝 Selon The Regi…
https://cyberveille.ch/posts/2025-12-06-aws-alerte-des-groupes-lies-a-pekin-exploitent-deja-la-faille-critique-react-react2shell-cve-2025-55182/ #CVE_2025_55182 #Cyberveille
December 6, 2025 at 10:00 PM
📢 CVE-2025-55182 'React2Shell' : GreyNoise observe une exploitation opportuniste à grande échelle
📝 Source: GreyNoise (Threat Signals) — …
https://cyberveille.ch/posts/2025-12-06-cve-2025-55182-react2shell-greynoise-observe-une-exploitation-opportuniste-a-grande-echelle/ #CVE_2025_55182 #Cyberveille
December 6, 2025 at 9:00 PM
📢 Panne Cloudflare du 5 décembre 2025 liée à un bug WAF lors d’une mitigation React
📝 Selon Cloudflare (blog), un incident de disponibilité le 5 déc…
https://cyberveille.ch/posts/2025-12-06-panne-cloudflare-du-5-decembre-2025-liee-a-un-bug-waf-lors-dune-mitigation-react/ #CVE_2025_55182 #Cyberveille
December 6, 2025 at 6:30 PM
📢 Publication des PoC originaux de React2Shell (CVE-2025-55182) démontrant une RCE
📝 Source: dépôt public de l’auteur; contexte: la publication interv…
https://cyberveille.ch/posts/2025-12-06-publication-des-poc-originaux-de-react2shell-cve-2025-55182-demontrant-une-rce/ #CVE_2025_55182 #Cyberveille
December 6, 2025 at 5:30 PM
📢 Faille critique RCE (CVSS 10) dans React Server Components (CVE-2025-55182) – mises à jour urgentes
📝 Selon react.dev, une vulnérabil…
https://cyberveille.ch/posts/2025-12-04-faille-critique-rce-cvss-10-dans-react-server-components-cve-2025-55182-mises-a-jour-urgentes/ #CVE_2025_55182 #Cyberveille
December 4, 2025 at 8:30 AM