React2Shell Woes: China-Linked Hackers Exploit Vulnerability Faster Than You Can Say “Patch”
AWS Security discovered that China-linked threat actors wasted no time exploiting the React2Shell flaw, CVE-2025-55182, within hours of its disclosure. While AWS services are unaffected, they shared insights to help customers protect their systems. It seems these cyber ninjas are more punctual than a Swiss watch.

Hot Take:
Who knew React components could cause such a chain reaction? These threat actors sure didn’t waste any time in turning a coding flaw into their own version of speed dating—except here, they’re meeting your server vulnerabilities instead of potential soulmates. AWS may not be affected directly, but they’re definitely playing the role of the concerned friend, warning everyone else about these suitors from China. Time to swipe left and patch up, folks!
Key Points:
- AWS Security warns of React2Shell vulnerability being exploited by China-linked threat actors.
- The flaw is a pre-authentication remote code execution vulnerability in specific React Server Components versions.
- Exploitation observed from groups Earth Lamia and Jackpot Panda linked to Chinese cyber operations.
- Threat actors quickly weaponize public Proof of Concepts (PoCs) for opportunistic attacks.
- Failed attempts add significant log noise, potentially masking more sophisticated attacks.
