VulnerabilitiesCRITICAL

CVE-2025-55182 - Hackers Breach 766 Next.js Hosts

Featured image for CVE-2025-55182 - Hackers Breach 766 Next.js Hosts
THThe Hacker News
CVE-2025-55182Next.jsAWSCisco Taloscredential harvesting
🎯

Basically, hackers found a way to steal passwords and secrets from many websites using a serious flaw in their code.

Quick Summary

Hackers have exploited a critical vulnerability in Next.js, breaching 766 hosts and stealing sensitive credentials. Organizations must take swift action to mitigate risks and secure their systems.

What Happened

A significant credential harvesting operation has emerged, exploiting the React2Shell vulnerability (CVE-2025-55182) to breach 766 Next.js hosts. This operation has been attributed to a threat cluster known as UAT-10608 by Cisco Talos. The attackers are using automated scripts to extract sensitive information, including database credentials, SSH private keys, AWS secrets, and more.

The Flaw

CVE-2025-55182 is a critical vulnerability with a CVSS score of 10.0. It affects React Server Components and the Next.js App Router, allowing remote code execution. This flaw serves as the initial access point for attackers, enabling them to deploy a collection framework named NEXUS Listener.

What's at Risk

The compromised hosts span multiple geographic regions and cloud providers. The attackers harvest a wide variety of sensitive data, such as:

  • Environment variables
  • SSH private keys
  • API keys (including Stripe and GitHub tokens)
  • Kubernetes service account tokens
  • Docker configurations This extensive data gathering poses a significant risk to organizations, as it provides a detailed map of their infrastructure.

Tactics & Techniques

The attackers utilize automated scanning tools to identify vulnerable Next.js deployments. Once access is gained, they deploy a multi-phase harvesting script to collect various details from the compromised systems. The NEXUS Listener GUI allows operators to view and analyze the stolen information, including statistics on the number of hosts compromised and types of credentials extracted.

Defensive Measures

Organizations are urged to take immediate action to protect themselves:

  • Audit your environments to enforce the principle of least privilege.
  • Enable secret scanning to detect exposed credentials.
  • Avoid reusing SSH key pairs and implement IMDSv2 enforcement on AWS EC2 instances.
  • Rotate credentials if a compromise is suspected.

The aggregate dataset from this breach not only represents immediate operational value but also provides intelligence for potential follow-on attacks. This emphasizes the importance of robust security measures to safeguard sensitive information and infrastructure.

🔒 Pro insight: The scale of this operation underscores the urgent need for proactive vulnerability management and continuous monitoring of cloud environments.

Original article from

THThe Hacker News
Read Full Article

Related Pings

HIGHVulnerabilities

OpenSSH Vulnerabilities - Security Advisory Released

OpenSSH has issued a security advisory for vulnerabilities in versions prior to 10.3. Users need to update to the latest version to protect their systems. This advisory highlights critical risks that could lead to unauthorized access. Stay secure by applying the necessary updates.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Progress ShareFile - Security Vulnerability Advisory Released

Progress has issued a security advisory for ShareFile vulnerabilities. Users must update to versions v5.12.4 or later to protect their data. This is crucial for maintaining security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mongoose Vulnerabilities - Cesanta Issues Security Advisory

Cesanta has issued a security advisory for Mongoose, affecting versions 7.0 to 7.20. Users must update to safeguard against vulnerabilities. Don't wait—protect your systems now!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has patched critical vulnerabilities that could allow attackers to bypass authentication and gain system access. Organizations using Cisco products are urged to update immediately to avoid risks.

Security Affairs·
CRITICALVulnerabilities

Critical Vulnerability Found in Claude Code After Source Leak

A critical vulnerability in Claude Code was discovered shortly after its source code leak. This flaw could allow attackers to bypass security measures and steal sensitive credentials, posing a significant risk. Developers must act quickly to protect their systems.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-3502 - CISA Adds New Exploited Vulnerability

CISA has added a new vulnerability, CVE-2026-3502, to its KEV Catalog. This flaw affects the TrueConf Client and poses serious risks to federal networks. Timely remediation is essential to prevent exploitation.

CISA Advisories·