Skip to main content
Mallory
Back to intelligence
actively-exploited-vulnerabilityrapid-weaponizationinternet-facing-service-vulnerabilityopen-source-dependency-vulnerability

JavaScript/Node.js Ecosystem Vulnerabilities: Next.js React2Shell Exploitation and Prototype-Pollution/DoS Bugs in Axios and CASL

Updated 17d agoFirst seen Feb 11, 20268 sources

Threat actors began actively exploiting React2Shell (CVE-2025-55182), a critical issue affecting Next.js and React Server Components that can enable unauthenticated remote code execution on vulnerable, internet-facing servers. Reporting describes exploitation starting within ~20 hours of public disclosure, with attacks observed as malicious HTTP POST requests targeting routes such as /_next/server and /_next/flight, abusing server-component serialization to inject commands into the application runtime. WhoisXMLAPI attributed a large share of scanning/exploitation activity to the “ILOVEPOOP” toolkit, which used centralized infrastructure (noted as high-traffic nodes hosted in the Netherlands), rotating scanner nodes, and a distinctive request fingerprint including non-standard headers like X-Nextjs-Request-Id: poop1234 and Next-Action: x.

Separately, two additional JavaScript supply-chain/library vulnerabilities were disclosed that can be triggered via attacker-controlled input in Node.js applications. Axios is affected by a high-severity denial-of-service flaw (CVE-2026-25639, CVSS 7.5) in mergeConfig, where a configuration object containing an own __proto__ property can cause a TypeError and crash the Node.js process when user input is parsed (e.g., via JSON.parse()) and passed into Axios configuration. CERT/CC also published VU#458422 for a prototype pollution vulnerability in CASL Ability (versions 2.4.0–6.7.4) in rulesToFields() / setByPath() (extra module), where insufficient sanitization of path segments allows writing to Object.prototype via special keys (e.g., prototype, constructor, and _proto_), potentially enabling broad application compromise up to arbitrary code execution depending on how polluted properties are later used.

Share:
JavaScript/Node.js Ecosystem Vulnerabilities: Next.js React2Shell Exploitation and Prototype-Pollution/DoS Bugs in Axios and CASL
Stay ahead

Get ahead of threats like this

Mallory correlates global threat intelligence with your attack surface — know if you’re exposed before adversaries strike.

EVENT TIMELINE

How this story unfolded

9 events from the most recent confirmed update back to the earliest known activity.

9 EVENTS
May 5, 202618d ago

Axios CVE-2026-42041 validateStatus pollution flaw is disclosed

A new Axios vulnerability, CVE-2026-42041, was disclosed involving the mergeDirectKeys configuration merge strategy. Because Axios checked validateStatus with the JavaScript in operator, a polluted Object.prototype.validateStatus could be treated as user-supplied, allowing a malicious response validator that could enable authentication or response-handling bypass.

CVE-2026-42041: CVE-2026-42041: Prototype Pollution Gadget in Axios Leading to Authentication Bypass | CVEReports

Axios CVE-2026-42035 header injection flaw is disclosed

A new Axios vulnerability, CVE-2026-42035, was disclosed involving prototype pollution in adapter logic that duck-types FormData objects. By inheriting append, getHeaders, and Symbol.toStringTag from a polluted Object.prototype, a plain object can be misclassified as FormData and trigger attacker-controlled header processing.

CVE-2026-42035: CVE-2026-42035: Axios Header Injection via Prototype Pollution Gadget | CVEReports
Apr 13, 20261mo ago

Axios CVE-2026-40175 disclosed and patched in version 1.15.0

A critical Axios vulnerability, CVE-2026-40175, was disclosed affecting versions prior to 1.15.0 due to improper HTTP header sanitization in the Node.js HTTP adapter. The issue can let prototype-polluted properties reach request headers, enabling request smuggling, metadata exfiltration, IAM credential theft, and possible cloud account takeover; Axios 1.15.0 was identified as the patched release.

Critical Axios Vulnerability Allows Remote Code Execution - PoC Released
Feb 10, 20263mo ago

Axios maintainers release fixes for CVE-2026-25639

Axios maintainers released updates to address the mergeConfig crash issue affecting Node.js servers that pass untrusted input into Axios configuration merging. Users were urged to upgrade to version 1.13.4 or later, with 1.13.5 specifically noted as restoring stability.

Axios DoS vulnerability CVE-2026-25639 is reported

A high-severity denial-of-service flaw in Axios, tracked as CVE-2026-25639 and scored CVSS 7.5, was reported. The issue in mergeConfig can trigger a TypeError and crash Node.js processes when a configuration object contains __proto__ as an own property.

CERT/CC publishes advisory on CASL Ability prototype pollution flaw

CERT/CC published vulnerability note VU#458422 covering a prototype pollution vulnerability in CASL Ability. No further synopsis details were provided in the reference.

WhoisXMLAPI attributes React2Shell activity to ILOVEPOOP toolkit

Analysts linked a large share of the React2Shell exploitation activity to a toolkit called ILOVEPOOP. The toolkit was described as using centralized infrastructure based on two high-traffic servers in the Netherlands, rotating scanner nodes, and distinctive HTTP headers for detection.

Dec 5, 20256mo ago

Exploitation of React2Shell begins within about 20 hours

Attackers began exploiting internet-facing systems shortly after public disclosure, using malicious HTTP POST requests to routes such as /_next/server and /_next/flight. Early activity included high-volume scanning to find exposed targets before they could be patched.

Dec 4, 20256mo ago

React2Shell vulnerability publicly disclosed

The critical Next.js and React Server Components flaw dubbed React2Shell, tracked as CVE-2025-55182, was publicly disclosed. The bug enables unauthenticated remote code execution via abuse of server component serialization.

The operational view lives in Mallory

See the full picture, correlated to your attack surface.

This page covers what’s public. Mallory adds the parts that aren’t — which of your assets are affected, which threat actors are using it right now, which detections to deploy, and what to do next.
Exposure mapping

Map indicators from this story to your assets and identify affected systems in minutes.

Threat actor evidence

Every observed campaign, victim, and pivot linked to actors named in this story.

Associated malware

Malware, exploits, and IOCs connected to the activity described here.

Detection signatures

YARA, Sigma, and Snort rules deployed to your SIEM as soon as they’re published.

Scheduled alerts

Get matching new stories delivered to your team as they break — not the next morning.

AI threads

Ask questions about this story and take action on the answers.