编译 | Tina、冬梅上周刚追完 10 级补丁,以为能喘口气了?还不行。12 月 12 日,React 官方确认,研究人员在验证上周补丁时,竟又在 React Server Components(RSC)里发现了两处新漏洞。过去一周,React2Shell 漏洞的余威仍在:服务器被劫持挖矿、云厂商紧急封禁、甚至引发 Cloudflare ...
来自Wiz、Palo Alto Networks旗下Unit 42、Google ...
"根据我们在GreyNoise Intelligence的统计,React2Shell仍在持续爆发,"Morris说。"我们继续堆积了相当多的不同恶意软件载荷。利用率仍然非常高,自披露以来,利用此漏洞的累计网络数量几乎每天都在创下历史新高。" ...
The explosive, easy-to-trigger vulnerability was exploited within hours of disclosure, exposing the risks of default ...
React2Shell (CVE-2025-55182) is a critical vulnerability affecting the most widely used React-based services across the web ecosystem. With low exploitation complexity and publicly available PoCs, ...
In early December 2025, the React core team disclosed two new vulnerabilities affecting React Server Components (RSC). These issues – Denial-of-Service and Source Code Exposure were found by security ...
A server-side software module constructed as an ActiveX component that is stored on a Windows client/server system or a Windows website. On a website, ActiveX Server Components can be called from ...
Unlike server-side rendering, React Server Components aim to fully replace client-side functionality with work done on the server. Let’s see how this works. React remains a flagship among front-end ...