Dec 08, 2025 • Wiz Security Research
React2Shell: Technical Deep-Dive & In-the-Wild Exploitation of CVE-2025-55182
Security researchers have identified active in-the-wild exploitation of CVE-2025-55182, dubbed React2Shell. This vulnerability enables attackers to execute...
Executive Summary
Security researchers have identified active in-the-wild exploitation of CVE-2025-55182, dubbed React2Shell. This vulnerability enables attackers to execute remote code, leading to severe compromise scenarios. Observed attack chains involve initial credential harvesting followed by the deployment of sophisticated cloud backdoors, allowing persistent access to victim environments. The exploitation mechanics suggest a high level of sophistication, targeting cloud infrastructure specifically. Organizations are urged to prioritize patching CVE-2025-55182 immediately to prevent unauthorized access. Additionally, implementing robust monitoring for credential theft attempts and anomalous cloud activity is critical. Defenders should also enforce strict access controls across all cloud assets. While no specific threat actor group has been publicly attributed to these campaigns, the active nature of the exploitation indicates a significant risk to enterprises relying on vulnerable services. Immediate mitigation steps are required to secure assets against this emerging threat landscape and prevent data exfiltration effectively.
Summary
We break down the exploit mechanics and detail active in-the-wild attacks observed by our team, from credential harvesting to sophisticated cloud backdoors.
Published Analysis
Security researchers have identified active in-the-wild exploitation of CVE-2025-55182, dubbed React2Shell. This vulnerability enables attackers to execute remote code, leading to severe compromise scenarios. Observed attack chains involve initial credential harvesting followed by the deployment of sophisticated cloud backdoors, allowing persistent access to victim environments. The exploitation mechanics suggest a high level of sophistication, targeting cloud infrastructure specifically. Organizations are urged to prioritize patching CVE-2025-55182 immediately to prevent unauthorized access. Additionally, implementing robust monitoring for credential theft attempts and anomalous cloud activity is critical. Defenders should also enforce strict access controls across all cloud assets. While no specific threat actor group has been publicly attributed to these campaigns, the active nature of the exploitation indicates a significant risk to enterprises relying on vulnerable services. Immediate mitigation steps are required to secure assets against this emerging threat landscape and prevent data exfiltration effectively. We break down the exploit mechanics and detail active in-the-wild attacks observed by our team, from credential harvesting to sophisticated cloud backdoors. We break down the exploit mechanics and detail active in-the-wild attacks observed by our team, from credential harvesting to sophisticated cloud backdoors.
Linked Entities
- React2Shell
- CVE-2025-55182