Techub News reports that, according to Cointelegraph, the cybersecurity nonprofit organization Security Alliance (SEAL) disclosed a rising trend of attacks involving the injection of cryptocurrency theft programs into websites through vulnerabilities in the open-source front-end JavaScript library React. React is primarily used for building user interfaces and is widely applied in web applications. On December 3, the React team disclosed that white-hat hacker Lachlan Davidson discovered a security vulnerability in the software that allows unauthenticated remote code execution, enabling attackers to implant and run malicious code. SEAL pointed out that malicious actors are exploiting this vulnerability (CVE-2025-55182) to secretly inject wallet-clearing code into cryptocurrency websites.
React released a fix for the CVE-2025-55182 vulnerability on December 3 and recommends all users of react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack to upgrade immediately to eliminate the vulnerability. The team added: “If the application’s React code does not use server-side components, it is not affected by this vulnerability; similarly, if the application does not use frameworks, bundling tools, or bundling plugins that support React server-side components, it is also not affected.”
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
React: Hackers have embedded cryptocurrency theft programs into websites via JavaScript libraries; a fix has been released.
Techub News reports that, according to Cointelegraph, the cybersecurity nonprofit organization Security Alliance (SEAL) disclosed a rising trend of attacks involving the injection of cryptocurrency theft programs into websites through vulnerabilities in the open-source front-end JavaScript library React. React is primarily used for building user interfaces and is widely applied in web applications. On December 3, the React team disclosed that white-hat hacker Lachlan Davidson discovered a security vulnerability in the software that allows unauthenticated remote code execution, enabling attackers to implant and run malicious code. SEAL pointed out that malicious actors are exploiting this vulnerability (CVE-2025-55182) to secretly inject wallet-clearing code into cryptocurrency websites.
React released a fix for the CVE-2025-55182 vulnerability on December 3 and recommends all users of react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack to upgrade immediately to eliminate the vulnerability. The team added: “If the application’s React code does not use server-side components, it is not affected by this vulnerability; similarly, if the application does not use frameworks, bundling tools, or bundling plugins that support React server-side components, it is also not affected.”