MEDIUMVulnerability
Global

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

Thursday, April 2, 2026 at 07:30 PM UTC·Source: The Hacker News

Updated: Friday, April 3, 2026 at 02:38 AM UTC

Executive Summary

A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, shell command history, Stripe API keys, and GitHub tokens at scale. Cisco Talos has attributed the operation to a threat cluster it tracks as

Analysis

A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, shell command history, Stripe API keys, and GitHub tokens at scale. Cisco Talos has attributed the operation to a threat cluster it tracks as

Indicators of Compromise (1)

CVE (1)
CVE-2025-55182
Source Attribution

Originally published by The Hacker News on Apr 2, 2026.

Related Threats