• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Internet

Cloudflare Blames React2Shell Protections for Outage

Akinola Ajibola by Akinola Ajibola
December 6, 2025
in Internet
Share on FacebookShare on Twitter

Yes, Cloudflare has acknowledged that modifications made to its systems to address the serious “React2Shell” vulnerability directly caused a recent outage.

The global service outage that occurred on Friday, December 5, 2025, resulted in the failure of websites and online platforms all across the world, was caused by an internal error “500 Internal Server Error” notice, in the emergency patch rollout for a security vulnerability that affected the whole industry rather than a cyberattack. 

The event has now been attributed by the internet infrastructure business to the implementation of emergency mitigations intended to address a severe remote code execution vulnerability in React Server Components that is currently being aggressively exploited in attacks.

“Neither a cyberattack on Cloudflare’s systems nor any other malicious activity was directly or indirectly responsible for the problem. In a post-mortem, Cloudflare CTO Dane Knecht stated that it was instead caused by modifications made to our body parsing mechanism while trying to identify and address an industry-wide vulnerability found in React Server Components this week.

“A subset of customers were impacted, accounting for approximately 28% of all HTTP traffic served by Cloudflare.”

This high-severity security bug (named React2Shell) affects the React open-source JavaScript library for web and native user interfaces, as well as dependent React frameworks including Next.js, React Router, Waku, @parcel/rsc, @vitejs/plugin-rsc, and RedwoodSDK.

The vulnerability was discovered in the React Server Components (RSC) ‘Flight’ protocol, which allows unauthenticated attackers to gain remote code execution in React and Next.js applications by submitting malicious HTTP requests to React Server Function endpoints.

While numerous React packages in their default configuration (e.g., react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack) are susceptible, the problem only affects React versions 19.0, 19.1.0, 19.1.1, and 19.2.0 released within the last year.

The continuous exploitation of React2Shell according to security researchers with Amazon Web Services (AWS) have reported that several China-affiliated hacking groups, such as Earth Lamia and Jackpot Panda, have started exploiting the React2Shell vulnerability hours after the max-severity flaw was revealed, though the impact is not as widespread as initially thought.

Additionally, the NHS England National CSOC stated on Thursday that there are currently a number of working proof-of-concept attacks for CVE-2025-55182 and cautioned that “continued successful exploitation in the wild is highly likely.”

Cloudflare’s Global Network was unavailable for over six hours last month due to another global outage, which CEO Matthew Prince called the “worst outage since 2019.” 

In June, Cloudflare resolved yet another significant outage that affected Google Cloud’s infrastructure and resulted in Access authentication failures and Zero Trust WARP connectivity problems in several locations.

CVE-2025-55182 (also known as “React2Shell”) is the vulnerability that triggered the emergency action. It is a critical remote code execution (RCE) bug (10.0 CVSS score) discovered in the React Server Components (RSC) ‘Flight’ protocol that may be abused without authentication via unsafe deserialisation.

The vulnerability was aggressively exploited in the wild by threat actors linked to China within hours of its public announcement on December 3, 2025, prompting immediate action by service providers including Cloudflare.

Related Posts:

  • 020224_cloudflare
    Cloudflare Blames Configuration Error for Major Outage
  • -1x-1 (14)
    Cloudflare Outage Disrupts X, ChatGPT, and Major Sites
  • x-logo-phone-2025
    Real-Time Updates As X Experiences Worldwide Outage
  • None
    Investigation Underway into Starlink Global Outage
  • Satya-Nadella-Microsoft-1280-720
    Microsoft Probes Ongoing Microsoft 365 Outage
  • microsofts-surface-duo-dualscreen-androi-5f1f3d057e8c350ae07dd862-1-jul-28-2020-15-24-20-poster
    Microsoft Patch Tuesday Fixes 63 Bugs, 1 Zero-Day
  • Azure-logo.png
    Massive Downtime on Azure Affecting 365, Xbox,…
  • 0_c_BDi0qfpXCm4Gon
    ChatGPT Service Disrupted After Significant Outage Today

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cloudflarecloudflare down
Akinola Ajibola

Akinola Ajibola

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.