Security researchers at Datadog Security Labs have disclosed an active web traffic hijacking campaign exploiting React2Shell (CVE-2025-55182) to inject malicious configurations into NGINX servers. The campaign silently redirects legitimate traffic through attacker-controlled infrastructure while maintaining normal site functionality to avoid detection.

Campaign overview

AttributeDetails
VulnerabilityCVE-2025-55182 (React2Shell)
CVSS score10.0 (Critical)
Attack typeConfiguration injection → traffic hijacking
Active periodJanuary 26 - February 2026+
Source IPs observed1,083 unique IPs
Primary targetsAsian TLDs, government, education
DiscoveryDatadog Security Labs
PublishedFebruary 4, 2026

Timeline

DateEvent
November 29, 2025React2Shell disclosed to React Team
December 2025CVE-2025-55182 assigned
January 2026Widespread exploitation begins
January 26 - February 2, 20261,083 unique attacking IPs observed
February 4, 2026Datadog publishes NGINX hijacking analysis

Attack methodology

Two-stage attack chain

StageAction
1Exploit React2Shell to gain server access
2Inject malicious NGINX configuration directives
3Traffic silently routed through attacker servers
4Cryptomining or reverse shell payloads deployed

NGINX configuration abuse

DirectiveMalicious use
proxy_passRedirect traffic to attacker backend
rewriteModify request URLs
proxy_set_headerPreserve headers to avoid detection
location blocksTarget specific paths

Why detection is difficult

FactorImpact
No NGINX vulnerabilityLegitimate features abused
Config files rarely auditedMalicious directives overlooked
Traffic still reaches destinationUser experience unchanged
Header preservationRequests appear normal

Exploitation statistics

Traffic distribution

SourcePercentage
193.142.147[.]209~28%
87.121.84[.]24~28%
Other IPs (1,081)~44%

Two IP addresses account for 56% of all exploitation attempts two months after React2Shell disclosure.

Payload types observed

PayloadDescription
Cryptomining binariesDownloaded from staging servers
Reverse shellsDirect connection to scanner IP
Traffic interceptionMan-in-the-middle positioning

Target profile

Geographic targeting

RegionTargeting intensity
India (.in)High
Indonesia (.id)High
Peru (.pe)Medium
Bangladesh (.bd)Medium
Thailand (.th)Medium

Sector targeting

Target typeExamples
Government (.gov)State agencies, ministries
Education (.edu)Universities, schools
Chinese hostingBaota (BT) Panel users

Infrastructure focus

PlatformRisk level
Baota (BT) PanelHigh (widely deployed in China)
NGINX with RSCHigh
Next.js deploymentsHigh

React2Shell vulnerability details

CVE-2025-55182

AttributeDetails
NameReact2Shell
ComponentReact Server Components (RSC)
Also affectsNext.js
TypeUnsafe deserialization
CVSS10.0 (Critical)
DiscovererLachlan Davidson
AuthenticationNone required

Exploitation mechanism

StepAction
1Attacker sends crafted serialized payload
2Server deserializes without validation
3Arbitrary code execution achieved
4Full server compromise

Detection guidance

Configuration indicators

IndicatorWhat to look for
Unexpected proxy_passUnknown backend servers
Suspicious rewrite rulesUnusual URL modifications
Unknown location blocksNew routing directives
Modified headersAltered proxy_set_header

Network indicators

IndicatorDetection method
Traffic to 193.142.147[.]209Firewall/proxy logs
Traffic to 87.121.84[.]24Network monitoring
Unexpected backend connectionsFlow analysis
Config file modificationsFile integrity monitoring

Host indicators

IndicatorDetection method
NGINX config changesConfiguration management
Cryptominer processesProcess monitoring
Reverse shell connectionsNetwork connection audit
Unauthorized file writesFile system monitoring

Indicators of compromise

Network IOCs

TypeValue
IP193.142.147[.]209
IP87.121.84[.]24

Configuration patterns

PatternRisk
proxy_pass to unknown hostsHigh
Encoded/obfuscated directivesCritical
New upstream definitionsMedium
Modified error pagesMedium

Remediation

Immediate actions

PriorityAction
CriticalPatch React/Next.js to latest versions
CriticalAudit NGINX configurations for unauthorized changes
HighBlock known malicious IPs
HighReview server access logs for exploitation

Configuration hardening

ControlPurpose
Configuration managementDetect unauthorized changes
Git-based config trackingVersion control for nginx.conf
Principle of least privilegeLimit config write access
Regular config auditsScheduled reviews

Monitoring recommendations

AreaImplementation
Config file integrityAIDE, Tripwire, or osquery
Network trafficMonitor for unexpected backends
Process executionTrack child processes from NGINX
Resource usageDetect cryptomining activity

Recommendations

For organizations running NGINX

PriorityAction
CriticalPatch React Server Components/Next.js
CriticalReview all NGINX configurations
HighImplement configuration change monitoring
HighAudit upstream/backend definitions
MediumReview Baota Panel deployments if applicable

For security teams

PriorityAction
HighAdd IOCs to detection systems
HighHunt for configuration anomalies
MediumReview RSC/Next.js asset inventory
MediumAssess Asian TLD exposure

For DevOps teams

PriorityAction
CriticalVersion control all NGINX configs
HighImplement change detection alerts
HighRestrict config file write permissions
MediumAutomate configuration compliance checks

Context

The React2Shell NGINX hijacking campaign demonstrates how attackers leverage critical vulnerabilities not just for immediate compromise, but to establish persistent traffic interception capabilities. By abusing legitimate NGINX features rather than exploiting NGINX itself, attackers create configurations that evade traditional vulnerability scanning.

The campaign’s focus on Asian TLDs and government/education targets suggests potential state-aligned or financially motivated actors seeking either intelligence collection or cryptomining revenue. The dual-payload approach—cryptomining and reverse shells—indicates operators may be monetizing access while maintaining persistent footholds.

The concentration of attack traffic from just two IP addresses (56% of attempts) provides defenders with high-confidence blocking indicators. However, the remaining 1,081 source IPs demonstrate the distributed nature of React2Shell exploitation.

Organizations running React Server Components or Next.js should treat patching as critical priority. The CVSS 10.0 score reflects the vulnerability’s severity: unauthenticated remote code execution with no user interaction required.

For NGINX administrators, this campaign reinforces that configuration files are attack surfaces requiring the same security rigor as application code. Configuration management, version control, and integrity monitoring should be standard practice for production deployments.