Dec 05, 2025 • PortSwigger Research
How to detect React2Shell with Burp Suite
This intelligence report details the discovery of two critical vulnerabilities collectively known as React2Shell, tracked under CVE-2025-55182 and...
Executive Summary
This intelligence report details the discovery of two critical vulnerabilities collectively known as React2Shell, tracked under CVE-2025-55182 and CVE-2025-66478. These flaws are rapidly gaining traction within the security community, suggesting imminent exploitation risks for organizations utilizing React-based frameworks. The designation implies potential remote code execution capabilities, allowing attackers to gain shell access to compromised systems. Detection strategies currently focus on using Burp Suite to identify exploitation attempts within web traffic. Given the critical severity rating, immediate mitigation is required. Security teams should prioritize patching affected libraries and implementing robust web application firewall rules to block malicious requests. Although no specific threat actors have been attributed to these vulnerabilities yet, the critical nature demands urgent remediation. Organizations must conduct immediate asset inventory checks to determine exposure and prevent unauthorized access or data breaches resulting from successful exploitation attempts in production environments. Prompt action is advised.
Summary
Detecting React2Shell with Burp Suite Two new critical vulnerabilities, collectively known as React2Shell (CVE-2025-55182 and CVE-2025-66478), are rapidly gaining traction in the security community. D
Published Analysis
This intelligence report details the discovery of two critical vulnerabilities collectively known as React2Shell, tracked under CVE-2025-55182 and CVE-2025-66478. These flaws are rapidly gaining traction within the security community, suggesting imminent exploitation risks for organizations utilizing React-based frameworks. The designation implies potential remote code execution capabilities, allowing attackers to gain shell access to compromised systems. Detection strategies currently focus on using Burp Suite to identify exploitation attempts within web traffic. Given the critical severity rating, immediate mitigation is required. Security teams should prioritize patching affected libraries and implementing robust web application firewall rules to block malicious requests. Although no specific threat actors have been attributed to these vulnerabilities yet, the critical nature demands urgent remediation. Organizations must conduct immediate asset inventory checks to determine exposure and prevent unauthorized access or data breaches resulting from successful exploitation attempts in production environments. Prompt action is advised. Detecting React2Shell with Burp Suite Two new critical vulnerabilities, collectively known as React2Shell (CVE-2025-55182 and CVE-2025-66478), are rapidly gaining traction in the security community. D Detecting React2Shell with Burp Suite Two new critical vulnerabilities, collectively known as React2Shell (CVE-2025-55182 and CVE-2025-66478), are rapidly gaining traction in the security community. D
Linked Entities
- CVE-2025-55182
- CVE-2025-66478