<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cloud-Security on cybercrime.club</title><link>https://cybercrime.club/tags/cloud-security/</link><description>Recent content in Cloud-Security on cybercrime.club</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 03 Apr 2026 09:30:00 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/cloud-security/index.xml" rel="self" type="application/rss+xml"/><item><title>React2Shell Under Mass Exploitation: 766+ Next.js Hosts Breached in Credential Harvesting Campaign</title><link>https://cybercrime.club/posts/react2shell-cve-2025-55182-mass-credential-harvesting/</link><pubDate>Fri, 03 Apr 2026 09:30:00 -0400</pubDate><guid>https://cybercrime.club/posts/react2shell-cve-2025-55182-mass-credential-harvesting/</guid><description>&lt;p>A large-scale automated credential harvesting campaign is actively exploiting CVE-2025-55182, the critical pre-authentication remote code execution vulnerability in React Server Components known as React2Shell. Researchers have confirmed at least 766 compromised hosts across multiple cloud providers and geographic regions, with the operation showing no signs of slowing down.&lt;/p>
&lt;h2 id="the-vulnerability">The Vulnerability&lt;/h2>
&lt;p>CVE-2025-55182 carries a maximum CVSS score of 10.0. The flaw affects React Server Components as implemented in Next.js and related frameworks, allowing remote unauthenticated attackers to achieve arbitrary code execution. The vulnerability was initially disclosed and patched in late 2025, with Microsoft publishing detailed defense guidance in December 2025. Despite patches being available for months, a significant number of internet-facing deployments remain unpatched.&lt;/p></description></item></channel></rss>