Tech »  Topic »  React2Shell Exploited in Large-Scale Credential Harvesting Campaign

React2Shell Exploited in Large-Scale Credential Harvesting Campaign


A threat actor has been exploiting vulnerable Next.js applications to compromise systems and exfiltrate credentials at scale, Cisco’s Talos security researchers warn.

Tracked as UAT-10608, the threat actor relies on automated scanning to identify applications impacted by CVE-2025-55182 (CVSS score of 10), a critical React vulnerability that allows remote, unauthenticated attackers to execute arbitrary code, and which is tracked as React2Shell by the cybersecurity community.

Following initial access, the attackers leverage automated scripts and the Nexus Listener framework to harvest credentials, cloud tokens, SSH keys, and environment secrets at scale.

According to Talos, at least 766 systems have been compromised, and more than 10,000 files have been collected as part of the campaign.

“The breadth of the victim set and the indiscriminate targeting pattern is consistent with automated scanning — likely based on host profile data from services like Shodan, Censys, or custom scanners to enumerate publicly reachable ...


Copyright of this story solely belongs to securityweek . To see the full text click HERE