← Back to BrewedIntel
vulnerabilitycriticalVulnerability ExploitationCVE-2025-55182CVE-2025-66478

Dec 05, 2025 • PortSwigger Research

How to detect React2Shell with Burp Suite

This intelligence report details the discovery of two critical vulnerabilities collectively known as React2Shell, tracked under CVE-2025-55182 and...

Source
PortSwigger Research
Category
vulnerability
Severity
critical

Executive Summary

This intelligence report details the discovery of two critical vulnerabilities collectively known as React2Shell, tracked under CVE-2025-55182 and CVE-2025-66478. These flaws are rapidly gaining traction within the security community, suggesting imminent exploitation risks for organizations utilizing React-based frameworks. The designation implies potential remote code execution capabilities, allowing attackers to gain shell access to compromised systems. Detection strategies currently focus on using Burp Suite to identify exploitation attempts within web traffic. Given the critical severity rating, immediate mitigation is required. Security teams should prioritize patching affected libraries and implementing robust web application firewall rules to block malicious requests. Although no specific threat actors have been attributed to these vulnerabilities yet, the critical nature demands urgent remediation. Organizations must conduct immediate asset inventory checks to determine exposure and prevent unauthorized access or data breaches resulting from successful exploitation attempts in production environments. Prompt action is advised.

Summary

Detecting React2Shell with Burp Suite Two new critical vulnerabilities, collectively known as React2Shell (CVE-2025-55182 and CVE-2025-66478), are rapidly gaining traction in the security community. D

Published Analysis

This intelligence report details the discovery of two critical vulnerabilities collectively known as React2Shell, tracked under CVE-2025-55182 and CVE-2025-66478. These flaws are rapidly gaining traction within the security community, suggesting imminent exploitation risks for organizations utilizing React-based frameworks. The designation implies potential remote code execution capabilities, allowing attackers to gain shell access to compromised systems. Detection strategies currently focus on using Burp Suite to identify exploitation attempts within web traffic. Given the critical severity rating, immediate mitigation is required. Security teams should prioritize patching affected libraries and implementing robust web application firewall rules to block malicious requests. Although no specific threat actors have been attributed to these vulnerabilities yet, the critical nature demands urgent remediation. Organizations must conduct immediate asset inventory checks to determine exposure and prevent unauthorized access or data breaches resulting from successful exploitation attempts in production environments. Prompt action is advised. Detecting React2Shell with Burp Suite Two new critical vulnerabilities, collectively known as React2Shell (CVE-2025-55182 and CVE-2025-66478), are rapidly gaining traction in the security community. D Detecting React2Shell with Burp Suite Two new critical vulnerabilities, collectively known as React2Shell (CVE-2025-55182 and CVE-2025-66478), are rapidly gaining traction in the security community. D

Linked Entities

  • CVE-2025-55182
  • CVE-2025-66478