Blogs & news

The Sawah Cyber Security blog offers insights, updates, and expert advice on the latest cybersecurity trends. Stay informed about evolving threats, industry best practices, and innovative solutions to help keep your business protected.

Blogs & news

The Sawah Cyber Security blog offers insights, updates, and expert advice on the latest cybersecurity trends. Stay informed about evolving threats, industry best practices, and innovative solutions to help keep your business protected.

Blogs & news

React2Shell Vulnerabilities & How Sawah Cyber Security Respond to it

Blogs & news

React2Shell Vulnerabilities & How Sawah Cyber Security Respond to it

Introduction to React2shell

A few days ago, two highly severe vulnerabilities were discovered & each receiving critical severity scores due to their potential impact on company systems. These vulnerabilities are known as CVE-2025-55182 and CVE-2025-66478, both commonly referred to as React2Shell. They represent newly identified weaknesses found within React Server Components (RSC) and their implementations in Next.js. The fact is, this vulnerability isn’t always visible at first glance and requires a thorough scan to detect it.

What Is React2Shell and What Risks Hide Behind Remote Code Execution?

Global Next.js Exposure Report: 454K Potential Targets for React2Shell Exploitation

Source : shodan.io

Based on global scanning data from Shodan, there are currently 454,293 Next.js hosts exposed to the internet. This indicates the massive worldwide adoption of Next.js and highlights how large the potential blast radius could be if vulnerabilities like React2Shell are exploited.

Source : shodan.io

The chart above shows that Next.js adoption continues to accelerate significantly year over year. In the span of 24 months, the number of public hosts increased from 237,694 to over 512,742, indicating aggressive global adoption and a rapidly expanding exposure surface.

So, what exactly is React2Shell? React2Shell is the name given to a vulnerability that allows attackers to manipulate or modify data and ultimately execute code directly on a server. This is made possible through a mechanism known as Remote Code Execution (RCE).

Why React2Shell is a Serious Problem

React2Shell gives attackers a path to: 

  • Modify or steal data
  • Execute malicious code on your server
  • Gain access to internal system
  • Launch further attacks inside your network

This What Your Company Should Do First

Solution 1: Free Consultation (Recommended for All Companies)

We offer Consultancy services to help clients understand what steps they need to take to strengthen their cybersecurity posture. Talk directly with our Cyber Security Team to Understand.

Solution 2: Quick Vulnerability Scan (React2Shell Check)

Sawah Cyber Security, as a Managed Security Service Provider (MSSP) based in Bali, doing a Continuous Penetration Test to see whether your systems are affected by this vulnerability.

Solution 3: Continuous Protection with Attack Surface Management (ASM)

Sawah Cyber Security provides an Attack Surface Management (ASM) service, where we work as a partnership with a leading technology partner, Searchlight Cyber, to help organizations close these gaps using the tools and capabilities included in our service portfolio.

Call for Collaboration – Secure Your Company/Organization with Sawah Cyber Security.

For existing clients of Sawah Cyber Security we provide already protection and consultancy services. For new clients are able to provide various solutions and provide recommendations :

And also We provide Attack Surface Management together with our exclusive partner AssetNote. If your company needs the tool, feel free to contact us.

đź“© Contact us at [email protected]

Let’s collaborate to build a safer and more resilient digital Indonesia.

Share this with your network

Picture of Jeffrey Jansen

Jeffrey Jansen

This article was written by Jeffrey Jansen, co-founder and director of Sawah Cyber Security. With over 15 years of experience in cybersecurity,
Jeffrey is dedicated to helping organizations build resilience and protecting their critical systems and data. His personal mission is to set Sawah Cyber Security on the map of Bali as leading cybersecurity key player.

Picture of Jeffrey Jansen

Jeffrey Jansen

This article was written by Jeffrey Jansen, founder of Sawah Cyber Security. With over a decade of experience in cybersecurity, Jeffrey is dedicated to helping businesses safeguard their digital assets and stay ahead of emerging cyber threats.

Share this with
your network

Recent posts

Do you need quick consultation?

If you’re facing urgent security concerns or need expert advice, we’re here to help. Reach out for a quick consultation with our team, and we’ll provide tailored solutions to safeguard your business against digital threats swiftly and effectively.

Do you need quick consultation?

If you’re facing urgent security concerns or need expert advice, we’re here to help. Reach out for a quick consultation with our team, and we’ll provide tailored solutions to safeguard your business against digital threats swiftly and effectively.

Download Case Study

*By submitting this form you agree to the Website Terms of Use, consent to be contacted by Sawah Cybersecurity and its partners, and acknowledge the Privacy Notice.

Sawah Cyber Security
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Our privacy policy: https://sawahcyber.id/en/privacy-policy/