<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Maverick Security</title>
	<atom:link href="https://mavericksec.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://mavericksec.com/</link>
	<description>Cybersecurity Consulting Services</description>
	<lastBuildDate>Wed, 07 Jan 2026 19:17:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://mavericksec.com/wp-content/uploads/2022/07/elementor/thumbs/Maverick_Security_Icon_Blue_Gradient-r31luay6h7ndu1xc07rpne4ycy91t54wkrts611bxq.webp</url>
	<title>Maverick Security</title>
	<link>https://mavericksec.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>React2Shell</title>
		<link>https://mavericksec.com/blog/react2shell-2/</link>
		
		<dc:creator><![CDATA[Tyler Hoyle]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 22:27:26 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mavericksec.com/?p=1169</guid>

					<description><![CDATA[<p>Maverick Security Blog React2Shell: Drop Everything and Patch Now! We&#8217;re a week into React2Shell (CVE-2025-55182) and it&#8217;s already ugly&#8230; This isn&#8217;t another &#8220;theoretical vulnerability&#8221; that security vendors overhype. This is a CVSS 10.0 remote code execution bug that lets attackers take over your server with nothing more than a crafted HTTP request. No authentication needed. [&#8230;]</p>
<p>The post <a href="https://mavericksec.com/blog/react2shell-2/">React2Shell</a> appeared first on <a href="https://mavericksec.com">Maverick Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1169" class="elementor elementor-1169" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-797289cc elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle" data-id="797289cc" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
							<div class="elementor-background-overlay"></div>
							<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-39f18b7" data-id="39f18b7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-67519233 elementor-widget elementor-widget-heading" data-id="67519233" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Maverick Security</h5>				</div>
				</div>
				<div class="elementor-element elementor-element-5caa92f elementor-widget elementor-widget-heading" data-id="5caa92f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Blog</h2>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-351a4435" data-id="351a4435" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3c43afae elementor-widget elementor-widget-spacer" data-id="3c43afae" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-73c4c15 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="73c4c15" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c461fcf" data-id="c461fcf" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-30395ce elementor-widget__width-initial elementor-widget elementor-widget-text-editor" data-id="30395ce" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h2 style="font-family: Play, sans-serif; font-weight: bold; color: #001f3d;" data-elementor-setting-key="title" data-pen-placeholder="Type Here..."><span style="font-size: 2.5rem;">React2Shell: Drop Everything and Patch Now!</span></h2>
<h2 data-start="412" data-end="488"><b>We&#8217;re a week into React2Shell (CVE-2025-55182) and it&#8217;s already ugly&#8230;</b></h2>
<p>This isn&#8217;t another &#8220;theoretical vulnerability&#8221; that security vendors overhype. This is a <strong>CVSS 10.0 remote code execution bug</strong> that lets attackers take over your server with nothing more than a crafted HTTP request. No authentication needed. No user interaction. Just one request and they&#8217;re in.</p>
<p>And we are seeing real-world exploitation:</p>
<ul>
<li>Stealing cloud credentials and environment variables</li>
<li>Installing backdoors for persistent access</li>
<li>Lateral movement into Kubernetes clusters</li>
</ul>
<p><strong style="font-size: 28px;">And its already being exploited in real-time.</strong></p>
<p><span style="font-size: 1rem;">Within hours of the December 3rd disclosure, Chinese state-sponsored groups were scanning for vulnerable servers. Now cryptominers are everywhere, and attackers are dropping shells on compromised systems. This isn&#8217;t coming—it&#8217;s here.</span></p>
<p><span style="font-size: 28px;"><b>Your default Next.js app is vulnerable, but the fix is simple.</b></span><br>If you ran <code>create-next-app</code> and deployed to production, you&#8217;re exposed. No special configuration required. The flaw is in React Server Components, which Next.js uses by default. Standard setup = vulnerable.&nbsp;<span style="font-size: 1rem;">Update React to 19.0.1, 19.1.2, or 19.2.1 depending on your version. Update Next.js to 15.1.4 or 16.0.1. That&#8217;s it. Don&#8217;t wait for your normal patch cycle. Do it now.</span></p>
<p><span style="font-weight: bold; font-size: 28px;">DO NOT RELY ON WAFs!</span><br>Some vendors pushed out WAF rules, but they&#8217;re runtime protections at best. The only real fix is patching. If you&#8217;re relying on a WAF and haven&#8217;t updated the actual code, you&#8217;re still exposed.</p>
<p><span style="font-weight: bold; font-size: 28px;">How to check to see if you&#8217;re vulnerable.</span><br>Look at your React version. If you see 19.0, 19.1.0, 19.1.1, or 19.2.0, you&#8217;re vulnerable. Also, check Next.js too as versions before 15.1.4 and 16.0.1 are affected.</p>
<p><span style="font-size: 1rem;">Run this in your project:</span></p>
<div>
<div>
<pre style="background: transparent; color: #383a42; font-family: var(--font-mono); direction: ltr; text-wrap-mode: nowrap; word-spacing: normal; word-break: normal; line-height: 1.5; tab-size: 2; hyphens: none; padding: 1em; margin: 0.5em 0px; overflow: auto; border-radius: 0.3em;"><code style="background: transparent; font-family: var(--font-mono); direction: ltr; word-spacing: normal; word-break: normal; line-height: 1.5; tab-size: 2; hyphens: none;"><code style="font-size: 16px; color: #001f3d; white-space: normal;">npm list react react-dom next create-next-app</code><span style="color: #001f3d; white-space: normal;">&nbsp;</span></code></pre>
</div>
</div>
<p style="font-size: 16px;"><span style="font-size: 1rem;">If th<span style="color: #383a42;"><span style="white-space: pre;">ose version show up, patch immediately!</span></span></span></p>
<h2><b>React2Shell isn&#8217;t going away</b></h2>
<p>Your dev team saying &#8220;oh we&#8217;ll get to it next sprint&#8221; isn&#8217;t going to cut it. This is a perfect 10.0 severity, attackers are already in production systems, and if you&#8217;re running React 19.x or Next.js 15.x/16.x, you&#8217;re exposed right now.</p>
<p>Patch today. Not Friday. Not next week. Today.</p>
<p>And if you&#8217;re sitting there wondering what apps are actually vulnerable in your environment, or if your devs really patched everything they said they did then&nbsp;<strong>we need to talk</strong>. We&#8217;ll find what&#8217;s exposed, verify your patches actually took, and make sure you&#8217;re not the next headline.</p>
<p><strong>Don&#8217;t wait for the breach notification.</strong></p>
<h2><b style="color: inherit; font-family: inherit; font-size: 2rem;"><span data-start="2741" data-end="2774">Maveric</span><span data-start="2741" data-end="2774">k Security</span></b></h2>
<div><b style="color: inherit; font-family: inherit; font-size: 2rem;"><span data-start="2741" data-end="2774"><br></span></b></div>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://mavericksec.com/blog/react2shell-2/">React2Shell</a> appeared first on <a href="https://mavericksec.com">Maverick Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>React2Shell</title>
		<link>https://mavericksec.com/blog/react2shell/</link>
					<comments>https://mavericksec.com/blog/react2shell/#respond</comments>
		
		<dc:creator><![CDATA[Tyler Hoyle]]></dc:creator>
		<pubDate>Thu, 09 Oct 2025 17:24:15 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mavericksec.com/?p=1136</guid>

					<description><![CDATA[<p>Maverick Security Blog React2Shell: Drop Everything and Patch Now! We&#8217;re a week into React2Shell (CVE-2025-55182) and it&#8217;s already ugly&#8230; This isn&#8217;t another &#8220;theoretical vulnerability&#8221; that security vendors overhype. This is a CVSS 10.0 remote code execution bug that lets attackers take over your server with nothing more than a crafted HTTP request. No authentication needed. [&#8230;]</p>
<p>The post <a href="https://mavericksec.com/blog/react2shell/">React2Shell</a> appeared first on <a href="https://mavericksec.com">Maverick Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1136" class="elementor elementor-1136" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-797289cc elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle" data-id="797289cc" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
							<div class="elementor-background-overlay"></div>
							<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-39f18b7" data-id="39f18b7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-67519233 elementor-widget elementor-widget-heading" data-id="67519233" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Maverick Security</h5>				</div>
				</div>
				<div class="elementor-element elementor-element-5caa92f elementor-widget elementor-widget-heading" data-id="5caa92f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Blog</h2>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-351a4435" data-id="351a4435" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3c43afae elementor-widget elementor-widget-spacer" data-id="3c43afae" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-73c4c15 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="73c4c15" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c461fcf" data-id="c461fcf" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-ff4188a elementor-widget elementor-widget-heading" data-id="ff4188a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">React2Shell: Drop Everything and Patch Now!</h1>				</div>
				</div>
				<div class="elementor-element elementor-element-05baa18 elementor-widget__width-initial elementor-widget elementor-widget-text-editor" data-id="05baa18" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h2 data-start="412" data-end="488"><b>We&#8217;re a week into React2Shell (CVE-2025-55182) and it&#8217;s already ugly&#8230;</b></h2><p>This isn&#8217;t another &#8220;theoretical vulnerability&#8221; that security vendors overhype. This is a <strong>CVSS 10.0 remote code execution bug</strong> that lets attackers take over your server with nothing more than a crafted HTTP request. No authentication needed. No user interaction. Just one request and they&#8217;re in.</p><p>And we are seeing real-world exploitation:</p><ul><li>Stealing cloud credentials and environment variables</li><li>Installing backdoors for persistent access</li><li>Lateral movement into Kubernetes clusters</li></ul><p><strong style="font-size: 28px;">And its already being exploited in real-time.</strong></p><p><span style="font-size: 1rem;">Within hours of the December 3rd disclosure, Chinese state-sponsored groups were scanning for vulnerable servers. Now cryptominers are everywhere, and attackers are dropping shells on compromised systems. This isn&#8217;t coming—it&#8217;s here.</span></p><p><span style="font-size: 28px;"><b>Your default Next.js app is vulnerable, but the fix is simple.</b></span><br />If you ran <code>create-next-app</code> and deployed to production, you&#8217;re exposed. No special configuration required. The flaw is in React Server Components, which Next.js uses by default. Standard setup = vulnerable. <span style="font-size: 1rem;">Update React to 19.0.1, 19.1.2, or 19.2.1 depending on your version. Update Next.js to 15.1.4 or 16.0.1. That&#8217;s it. Don&#8217;t wait for your normal patch cycle. Do it now.</span></p><p><span style="font-weight: bold; font-size: 28px;">DO NOT RELY ON WAFs!</span><br />Some vendors pushed out WAF rules, but they&#8217;re runtime protections at best. The only real fix is patching. If you&#8217;re relying on a WAF and haven&#8217;t updated the actual code, you&#8217;re still exposed.</p><p><span style="font-weight: bold; font-size: 28px;">How to check to see if you&#8217;re vulnerable.</span><br />Look at your React version. If you see 19.0, 19.1.0, 19.1.1, or 19.2.0, you&#8217;re vulnerable. Also, check Next.js too as versions before 15.1.4 and 16.0.1 are affected.</p><p><span style="font-size: 1rem;">Run this in your project:</span></p><div><div><pre style="background: transparent; color: #383a42; font-family: var(--font-mono); direction: ltr; text-wrap-mode: nowrap; word-spacing: normal; word-break: normal; line-height: 1.5; tab-size: 2; hyphens: none; padding: 1em; margin: 0.5em 0px; overflow: auto; border-radius: 0.3em;"><code style="background: transparent; font-family: var(--font-mono); direction: ltr; word-spacing: normal; word-break: normal; line-height: 1.5; tab-size: 2; hyphens: none;"><code style="font-size: 16px; color: #001f3d; white-space: normal;">npm list react react-dom next create-next-app</code><span style="color: #001f3d; white-space: normal;"> </span></code></pre></div></div><p style="font-size: 16px;"><span style="font-size: 1rem;">If th<span style="color: #383a42;"><span style="white-space: pre;">ose version show up, patch immediately!</span></span></span></p><h2><b>React2Shell isn&#8217;t going away</b></h2><p>Your dev team saying &#8220;oh we&#8217;ll get to it next sprint&#8221; isn&#8217;t going to cut it. This is a perfect 10.0 severity, attackers are already in production systems, and if you&#8217;re running React 19.x or Next.js 15.x/16.x, you&#8217;re exposed right now.</p><p>Patch today. Not Friday. Not next week. Today.</p><p>And if you&#8217;re sitting there wondering what apps are actually vulnerable in your environment, or if your devs really patched everything they said they did then <strong>we need to talk</strong>. We&#8217;ll find what&#8217;s exposed, verify your patches actually took, and make sure you&#8217;re not the next headline.</p><p><strong>Don&#8217;t wait for the breach notification.</strong></p><h2><b><span data-start="2741" data-end="2774">Maveric</span><span data-start="2741" data-end="2774">k Security</span></b></h2>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://mavericksec.com/blog/react2shell/">React2Shell</a> appeared first on <a href="https://mavericksec.com">Maverick Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mavericksec.com/blog/react2shell/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
