Researchers Gain Access to Hacker Dashboard in React2Shell Campaign

Security Lapse Exposes React2Shell Attackers' Credential Harvesting Dashboard

HIGH
April 4, 2026
4m read
VulnerabilityThreat IntelligenceThreat Actor

Related Entities

Threat Actors

UAT-10608

Organizations

Products & Tech

Next.js

CVE Identifiers

Full Report

Executive Summary

In a remarkable turn of events, researchers from Cisco Talos gained direct insight into a large-scale credential harvesting campaign by accessing the attackers' own backend infrastructure. A threat group, tracked as UAT-10608, was found actively exploiting CVE-2025-55182, a critical pre-authentication remote code execution (RCE) vulnerability in Next.js applications known as "React2Shell." The group's automated framework was compromising hundreds of hosts per day, exfiltrating credentials, API keys, and tokens to a database. However, a security misconfiguration by the attackers left their web-based dashboard for this database unprotected, allowing Talos researchers to observe the stolen data in real-time. The data included sensitive credentials for services like Amazon Web Services (AWS) and GitHub. Talos is now in the process of notifying the hundreds of victim organizations.

Threat Overview

The campaign centers on the mass exploitation of CVE-2025-55182 (React2Shell), a vulnerability disclosed four months prior. This RCE flaw in Next.js allows an unauthenticated attacker to execute arbitrary code by sending a malicious serialized payload to a Server Function endpoint.

The threat group UAT-10608 built an automated system to scan the internet for vulnerable servers and exploit them. The exploit payload was designed to harvest sensitive information from the compromised hosts, such as login credentials, environment variables, API keys, and access tokens. This data was then sent to a central database controlled by the attackers. In a display of poor operational security, the attackers' web application used to view and manage this stolen data was left exposed to the internet without a password, granting the Talos researchers a direct view into their operation.

Technical Analysis

  • Initial Access: T1190 - Exploit Public-Facing Application. The entire campaign relies on the mass exploitation of the public-facing React2Shell vulnerability, CVE-2025-55182.
  • Execution: The vulnerability allows for remote code execution, likely through a deserialization flaw. The attackers' payload would then execute commands on the server.
  • Credential Access: The primary goal of the post-exploitation payload was credential harvesting. This could involve multiple techniques, such as T1552.001 - Credentials In Files to read configuration files, or T1552.005 - Cloud API Credentials to steal AWS or other cloud provider keys.
  • Collection: The harvested data was collected and sent to the attackers' database.

Impact Assessment

The impact is widespread, affecting at least 766 hosts compromised in a single 24-hour period. Each compromised server represents a significant breach. The theft of AWS and GitHub credentials is particularly damaging, as these can be used to compromise entire cloud environments, access and poison source code repositories, or launch further supply chain attacks. For the victim organizations, this incident means not only is their web server compromised, but their core cloud and development infrastructure is also at immediate risk. The swift notification by Talos is critical to help these victims respond before the stolen credentials can be fully abused.

Detection & Response

  • Web Server & WAF Logs: Monitor logs for HTTP requests to Server Function endpoints that contain suspicious serialized payloads. Signatures for CVE-2025-55182 should be applied to Web Application Firewalls (WAFs).
  • Vulnerability Scanning: The most effective detection is to actively scan for and identify vulnerable Next.js applications in your environment.
  • Credential Leakage Detection: For victims, it is crucial to use the information provided by Talos to immediately rotate all exposed keys and credentials. Services like GitHub's secret scanning can also help detect committed credentials.
  • Incident Response: Any server found to be vulnerable to React2Shell should be considered fully compromised. It should be isolated, forensically analyzed, and rebuilt from a known-good state. All credentials and secrets on the machine must be rotated.

Mitigation

  • Patch Immediately: The primary mitigation is to patch the React2Shell vulnerability (CVE-2025-55182) in all Next.js applications. Given that the flaw was disclosed four months ago, any unpatched system is at extreme risk.
  • Secret Management: Avoid storing secrets, API keys, and credentials in plaintext configuration files or environment variables on a web server. Use a dedicated secrets management solution like HashiCorp Vault or AWS Secrets Manager. This aligns with M1043 - Credential Access Protection.
  • Egress Filtering: Restrict outbound internet access from web servers. Servers should only be allowed to connect to specific, required endpoints, which can prevent exploit payloads from exfiltrating data to an attacker's database.
  • Web Application Firewall (WAF): Deploy a WAF with rules specifically designed to block deserialization attacks and other attempts to exploit React2Shell. This is a form of M1050 - Exploit Protection.

Timeline of Events

1
April 4, 2026
This article was published

MITRE ATT&CK Mitigations

The most important mitigation is to patch the CVE-2025-55182 vulnerability in all Next.js applications.

Use dedicated secrets management solutions instead of storing credentials in files or environment variables on web servers.

Implement a Web Application Firewall (WAF) with rules to detect and block deserialization attacks targeting this vulnerability.

Apply strict egress filtering to web servers to prevent them from connecting to unauthorized external databases or C2 servers.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

React2ShellCVE-2025-55182Next.jsCisco Talosvulnerabilitycredential harvestingOPSEC

📢 Share This Article

Help others stay informed about cybersecurity threats