A critical React Server Components RCE bug is being weaponized to hijack servers, drain crypto wallets, plant Monero miners, and deepen a $3B 2025 theft wave despiteA critical React Server Components RCE bug is being weaponized to hijack servers, drain crypto wallets, plant Monero miners, and deepen a $3B 2025 theft wave despite

React bug triggers wallet-draining attacks as hackers hit crypto websites

2025/12/15 18:39

A critical React Server Components RCE bug is being weaponized to hijack servers, drain crypto wallets, plant Monero miners, and deepen a $3B 2025 theft wave despite urgent patch pleas.​

Summary
  • Security Alliance and Google TIG say attackers exploit CVE-2025-55182 in React Server Components to run arbitrary code, steal permit signatures, and drain crypto wallets.​
  • Vercel, Meta, and framework teams rushed patches and WAF rules, but researchers found two new RSC bugs and warn JavaScript supply-chain risks like the Josh Goldberg npm hack persist.​
  • Global Ledger reports over $3B stolen across 119 hacks in H1 2025, with funds laundered in minutes using bridges and privacy coins like Monero, and only 4.2% recovered.

A critical security vulnerability in React Server Components has prompted urgent warnings across the cryptocurrency industry, as threat actors exploit the flaw to drain wallets and deploy malware, according to Security Alliance.

Security Alliance announced that crypto-drainers are actively weaponizing CVE-2025-55182, urging all websites to review their front-end code immediately for suspicious assets. The vulnerability affects not only Web3 protocols but all websites using React, with attackers targeting permit signatures across platforms.

Users face risk when signing transactions, as malicious code intercepts wallet communications and redirects funds to attacker-controlled addresses, according to security researchers.

React’s official team disclosed CVE-2025-55182 on December 3, rating it CVSS 10.0 following Lachlan Davidson’s November 29 report through Meta Bug Bounty. The unauthenticated remote code execution vulnerability exploits how React decodes payloads sent to Server Function endpoints, allowing attackers to craft malicious HTTP requests that execute arbitrary code on servers, according to the disclosure.

React new versions

The flaw impacts React versions 19.0, 19.1.0, 19.1.1, and 19.2.0 across react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack packages. Major frameworks, including Next.js, React Router, Waku, and Expo, require immediate updates, according to the advisory.

Patches arrived in versions 19.0.1, 19.1.2, and 19.2.1, with Next.js users needing upgrades across multiple release lines from 14.2.35 through 16.0.10, according to the release notes.

Researchers have found two new vulnerabilities in React Server Components while attempting to exploit the patches, according to reports. These are new issues, separate from the critical CVE. The patch for React2Shell remains effective for the Remote Code Execution exploit, researchers stated.

Vercel deployed Web Application Firewall rules to automatically protect projects on its platform, though the company emphasized that WAF protection alone remains insufficient. Immediate upgrades to a patched version are required, Vercel stated in its December 3 security bulletin, adding that the vulnerability affects applications that process untrusted input in ways that permit remote code execution.

Google Threat Intelligence Group documented widespread attacks beginning on December 3, tracking criminal groups ranging from opportunistic hackers to government-backed operations. Chinese hacking groups installed various malware types on compromised systems, primarily targeting cloud servers on Amazon Web Services and Alibaba Cloud, according to the report.

These attackers employed techniques to maintain long-term access to victim systems, according to Google Threat Intelligence Group. Some groups installed software creating remote access tunnels, while others deployed programs that continuously download additional malicious tools disguised as legitimate files. The malware hides in system folders and automatically restarts to avoid detection, researchers reported.

Financially motivated criminals joined the attack wave starting on December 5, installing crypto-mining software that uses victims’ computing power to generate Monero, according to security researchers. These miners run constantly in the background, driving up electricity costs while generating profits for attackers. Underground hacking forums quickly filled with discussions sharing attack tools and exploitation experiences, researchers observed.

The React vulnerability follows a September 8 attack in which hackers compromised Josh Goldberg’s npm account and published malicious updates to 18 widely used packages, including chalk, debug, and strip-ansi. These utilities collectively account for over 2.6 billion weekly downloads, and researchers have discovered crypto-clipper malware that intercepts browser functions to swap legitimate wallet addresses with attacker-controlled ones.

Ledger CTO Charles Guillemet described that incident as a “large-scale supply chain attack,” advising users without hardware wallets to avoid on-chain transactions. The attackers gained access through phishing campaigns impersonating npm support, claiming accounts would be locked unless two-factor authentication credentials were updated by September 10, according to Guillemet.

Hackers are stealing cryptocurrency and moving it faster, with one laundering process reportedly taking only 2 minutes 57 seconds, according to industry data.

Global Ledger data shows hackers stole over $3 billion across 119 incidents in the first half of 2025, with 70% of breaches involving funds being moved before they became public. Only 4.2% of stolen assets were recovered, as laundering now takes seconds rather than hours, according to the report.

Organizations using React or Next.js are advised to patch immediately to versions 19.0.1, 19.1.2, or 19.2.1, deploy WAF rules, audit all dependencies, monitor network traffic for wget or cURL commands initiated by web server processes, and hunt for unauthorized hidden directories or malicious shell configuration injections, according to security advisories.

Market Opportunity
Wrapped REACT Logo
Wrapped REACT Price(REACT)
$0.05467
$0.05467$0.05467
+0.07%
USD
Wrapped REACT (REACT) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Will the 10% Rally Build Into a Bigger Run?

Will the 10% Rally Build Into a Bigger Run?

The post Will the 10% Rally Build Into a Bigger Run? appeared on BitcoinEthereumNews.com. MYX Finance jumped 10%, reaching the $3.43 mark. MYX’s daily trading volume
Share
BitcoinEthereumNews2025/12/16 02:37
‘Groundbreaking’: Barry Silbert Reacts to Approval of ETF with XRP Exposure

‘Groundbreaking’: Barry Silbert Reacts to Approval of ETF with XRP Exposure

The post ‘Groundbreaking’: Barry Silbert Reacts to Approval of ETF with XRP Exposure appeared on BitcoinEthereumNews.com. A “combo” ETF  Crypto ETF trailblazer  Digital Currency Group founder Barry Silbert has reacted to the approval of the Grayscale Digital Large Cap Fund  (GDLC), the very first multi-crypto exchange-traded fund (ETF), describing it as “groundbreaking.”  “Grayscale continues to be the first mover, driving new product innovations that bridge tradfi and digital assets,” Silbert said while commenting on the news.  Peter Mintzberg, chief executive officer at Graysacle, claims that the team behind the world’s leading cryptocurrency asset manager is working “expeditiously” in order to bring the product to the market.  A “combo” ETF  The ETF in question offers exposure to Bitcoin (BTC), Ethereum (ETH), as well as several other major altcoins, including the Ripple-linked XRP token, Solana (SOL), and Cardano (ADA). XRP, for instance, has a 5.2% share of the fund, making it the third-largest constituent.  The fund initially debuted as a private placement for accredited investors back in early 2018, and its shares later became available on over-the-counter (OTC) markets.  In early July, the SEC approved the conversion of GDLC into an ETF, but it was then abruptly halted for a “review” shortly after this.  As of Sept. 17, the fund currently has a total of $915.6 million in assets.  Crypto ETF trailblazer  It is worth noting that Grayscale is usually credited with kickstarting the cryptocurrency ETF craze by winning its court case against the SEC.  The SEC ended up approving Bitcoin ETFs in early 2024 and then followed up with Ethereum ETFs.  Grayscale’s flagship GBTC currently boasts more than $20.5 billion in net assets, according to data provided by SoSoValue.  Source: https://u.today/groundbreaking-barry-silbert-reacts-to-approval-of-etf-with-xrp-exposure
Share
BitcoinEthereumNews2025/09/19 03:39
Strategic Surge: BlackRock’s Major Digital Asset Expansion with 7 Key Hires

Strategic Surge: BlackRock’s Major Digital Asset Expansion with 7 Key Hires

BitcoinWorld Strategic Surge: BlackRock’s Major Digital Asset Expansion with 7 Key Hires In a powerful signal to the financial world, asset management titan BlackRock
Share
bitcoinworld2025/12/16 02:25