
Risky Business
The episode opens with a deep dive into the React2Shell vulnerability, officially known as CVE‑2023‑xxxx. This flaw resides in the serialization layer of React Server Components, allowing an attacker to craft malicious JavaScript objects that execute on the server during dependency resolution. Because modern applications increasingly blend client‑side and server‑side JavaScript, the bug blurs the traditional boundary between front‑end and back‑end, turning a framework once considered purely client‑side into a remote code execution vector. Understanding this attack surface is essential for developers who rely on Next.js, Shopify’s Hydrogen, and other React‑based stacks.
The hosts trace the rapid escalation from the initial patch to a ten‑line proof‑of‑concept that sparked a scramble across the ecosystem. Cloudflare suffered a notable outage while vendors rushed to release mitigations, highlighting how quickly a serialization bug can cascade into service disruption. While containerization and micro‑service architectures can sandbox vulnerable components, the discussion emphasizes that they do not fully eradicate the risk; proper runtime policies and strict dependency management remain critical. The conversation also notes the JavaScript supply‑chain’s agility—frequent redeployments aid rapid patching, contrasting sharply with the long‑tail challenges seen in legacy Java or PHP vulnerabilities.
Beyond the technical details, the episode broadens to strategic cyber‑risk considerations. Kroll’s Simon Onions stresses the need for board‑level awareness, especially after high‑profile ransomware incidents like Jaguar Land Rover. The hosts also examine Chinese APT activity targeting VMware hypervisors, where tools like BrickStorm enable stealthy lateral movement through compromised virtual machines. This blend of emerging framework bugs and sophisticated nation‑state tactics underscores why executives must integrate cyber resilience into governance, ensuring that both development teams and leadership stay ahead of evolving threats.
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
There’s a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate?
China is out popping shells with it
Linux adds support for PCIe bus encryption
Amnesty International says Intellexa can just TeamViewer into its customers’ surveillance systems
…and a Belgian murder suspect complains that GrapheneOS’s duress wipe feature failed him?
This week’s episode is sponsored by Kroll Cyber. Simon Onyons is Managing Director at Kroll’s Cyber and Data Resilience arm, and he discusses a problem near to many of our hearts. Just how do you explain cyber risk to the board?
This episode is also available on Youtube.
Show notes
Risky Bulletin: APTs go after the React2Shell vulnerability within hours - Risky Business Media
Guillermo Rauch on X: "React2Shell" / X
React2Shell-CVE-2025-55182-original-poc/README.md at main · lachlan2k/React2Shell-CVE-2025-55182-original-poc · GitHub
Hydrogen: Shopify’s headless commerce framework
Researchers track dozens of organizations affected by React2Shell compromises tied to China’s MSS | The Record from Recorded Future News
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
Three hacking groups, two vulnerabilities and all eyes on China | The Record from Recorded Future News
Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers
Sean Plankey nomination to lead CISA appears to be over after Thursday vote | CyberScoop
🕳 on X: "This guy is complaining that GrapheneOS “failed him”. Showing a Belgian 🇧🇪 police request for an interrogation regarding premeditated murder (as a suspect)." / X
Sanctioned spyware maker Intellexa had direct access to government espionage victims, researchers say | TechCrunch
To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware - Amnesty International Security Lab
Is ransomware finally on the decline? Treasury data offers cautious hope | CyberScoop
UK cyber agency warns LLMs will always be vulnerable to prompt injection | CyberScoop
In comedy of errors, men accused of wiping gov databases turned to an AI tool - Ars Technica
Comments
Want to join the conversation?
Loading comments...