# Attackers Exploit CVE-2025-55182 to Compromise 766 Next.js Sites and Harvest Credentials at Scale

_Friday, April 3, 2026 at 4:03 AM EDT · Cybersecurity · Latest · Tier 2 — Notable_

![Attackers Exploit CVE-2025-55182 to Compromise 766 Next.js Sites and Harvest Credentials at Scale — Primary](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8T48UROZtSjRXtkxVcNT2VmXbB1texWQPAqLbm06uwmJ8VsYFb_HeXOnZx9uz9QL-LB3aWdwcLm9TbuRler7w7jjXJlL_tQweQualaW4XEVav7Ysulqx_CJyc9a0P1dO1a69W_eQhroxV1LA_p5VB9T38Xubc3zXHgwd-4sAAc2whuv4ElnC5WtFSn7SH/s1700-e365/nextjs.jpg)

A large-scale credential harvesting campaign attributed by Cisco Talos to a tracked threat cluster has exploited CVE-2025-55182, a vulnerability in the React2Shell framework, as an initial access vector to breach more than 766 Next.js-based web applications, The Hacker News reported.

The operation systematically extracted sensitive data from compromised hosts including database credentials, SSH private keys, Amazon Web Services secrets, shell command history, Stripe API keys, and GitHub tokens. The breadth of credential types targeted suggests the campaign was designed to maximize downstream access and monetization options for the attackers.

Next.js is one of the most widely deployed JavaScript frameworks for building web applications and is used across industries including fintech, healthcare, and e-commerce. The scale of the compromise -- 766 hosts confirmed -- likely represents the visible portion of a larger campaign, as many intrusions go undetected or unreported.

Cisco Talos has shared indicators of compromise with its threat intelligence subscribers. Organizations running Next.js applications, particularly those using the React2Shell library, should treat the CVE as critical and prioritize patching and credential rotation for any systems that may have been exposed.

The vulnerability has been patched in updated versions of the affected library. Security teams are advised to audit their web application inventories, rotate all secrets that may have been accessible on affected systems, and review authentication logs for signs of unauthorized access since the vulnerability's disclosure window.

## Sources

- [The Hacker News](https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html)

---
Canonical: https://techandbusiness.org/newswire/BhC38kxC2c34wCqZrkdoQI
Retrieved: 2026-04-22T05:19:06.339Z
Publisher: Tech & Business (techandbusiness.org)
