Dec 17, 2025 • GreyNoise Blog
There's Payloads, And Then There's pAIloads: A Look At Selected Opportunistic (And Possibly AI-"Enhanced") React2Shell Probes and Attacks
Over the past week and a half, a significant surge in exploitation attempts known as the React2Shell campaign has been observed targeting vulnerable React...
Executive Summary
Over the past week and a half, a significant surge in exploitation attempts known as the React2Shell campaign has been observed targeting vulnerable React Server Components. This activity is characterized by a high volume of automated scanning probes, indicating a widespread opportunistic threat landscape. While most attacks appear automated, analysis suggests the presence of sophisticated outliers potentially enhanced by artificial intelligence. The primary threat involves attackers leveraging vulnerabilities within React frameworks to execute arbitrary code or gain unauthorized access to servers. Although specific threat actor groups remain unidentified, the scale of the campaign poses a medium severity risk to organizations utilizing React technologies. Defenders are advised to patch vulnerable components, monitor for unusual payload sizes, and implement strict input validation to mitigate the risk of shell execution. Continuous monitoring for automated scanner traffic is essential to detect and block these intrusion attempts effectively.
Summary
Over the past ~1.5 weeks, the React2Shell campaign has unleashed a flood of exploitation attempts targeting vulnerable React Server Components. Analyzing the payload size distribution across these attacks reveals a clear fingerprint of modern cybercrime, and a landscape dominated by automated scanners with a handful of sophisticated outliers.
Published Analysis
Over the past week and a half, a significant surge in exploitation attempts known as the React2Shell campaign has been observed targeting vulnerable React Server Components. This activity is characterized by a high volume of automated scanning probes, indicating a widespread opportunistic threat landscape. While most attacks appear automated, analysis suggests the presence of sophisticated outliers potentially enhanced by artificial intelligence. The primary threat involves attackers leveraging vulnerabilities within React frameworks to execute arbitrary code or gain unauthorized access to servers. Although specific threat actor groups remain unidentified, the scale of the campaign poses a medium severity risk to organizations utilizing React technologies. Defenders are advised to patch vulnerable components, monitor for unusual payload sizes, and implement strict input validation to mitigate the risk of shell execution. Continuous monitoring for automated scanner traffic is essential to detect and block these intrusion attempts effectively. Over the past ~1.5 weeks, the React2Shell campaign has unleashed a flood of exploitation attempts targeting vulnerable React Server Components. Analyzing the payload size distribution across these attacks reveals a clear fingerprint of modern cybercrime, and a landscape dominated by automated scanners with a handful of sophisticated outliers. Over the past ~1.5 weeks, the React2Shell campaign has unleashed a flood of exploitation attempts targeting vulnerable React Server Components. Analyzing the payload size distribution across these attacks reveals a clear fingerprint of modern cybercrime, and a landscape dominated by automated scanners with a handful of sophisticated outliers.