
December 2025 proved to be an active month in the global cyber threat landscape. While the year had already seen high levels of hacktivism and ransomware, the final month was defined by the disclosure of critical-severity vulnerabilities. These events, combined with a sharp increase in state-sponsored hybrid operations, forced organizations into an emergency patching cycle during the holiday period.
React2Shell: The Crisis of December
The standout threat of the month was React2Shell (tracked as CVE-2025-55182), a critical unauthenticated remote code execution (RCE) vulnerability in React Server Components (RSC). Disclosed on December 3, the flaw received a CVSS score of 10.0 due to its widespread adoption and ease of exploitation (with the PoC available only 30 hours after disclosure)
The vulnerability resides in the RSC “Flight” protocol, specifically how it handles serialized data chunks. Attackers can send a single, specially crafted HTTP POST request that bypasses authentication and executes arbitrary JavaScript with full Node.js privileges on the server.
Within the first eight days of disclosure, Cloudflare recorded over 582.1 million WAF hits targeting this flaw, averaging 3.49 million hits per hour.
Global sensors identified over 111,000 vulnerable IP addresses, with 77,800 in the U.S., 7,500 in Germany, and 4,000 in France. Threat actors were observed deploying everything from cryptocurrency miners to sophisticated, previously unseen Linux backdoors.
MongoBleed: Infrastructure at Risk
Mid-month, the focus shifted to the database layer with the disclosure of MongoBleed (CVE-2025-14847), a high-severity (CVSS 8.7) vulnerability in MongoDB Server.
Rooted in the zlib network message decompression logic, the vulnerability allows unauthenticated remote attackers to trigger a buffer over-read. By sending malformed packets, an attacker can force the server to return uninitialized heap memory.
Threat intelligence data from Censys and Wiz indicated that over 87,000 MongoDB instances were potentially vulnerable worldwide. Approximately 42% of cloud environments were found to have at least one vulnerable instance.
MongoBleed is a silent information leak. It allows attackers to harvest fragments of sensitive data – including passwords, API tokens, and user records – directly from memory. CISA added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on December 29, 2025.
According to the CERT-EU Cyber Brief 26-01, which analyzed 368 open-source reports this month, the landscape was further complicated by geopolitical friction:
Looking Ahead and Key Takeaways
Organizations entering 2026 must prioritize:
References
This entry is published as part of the SOCshare project (No. 101145843), which we are running together with Vilnius City Municipality. It is partly funded by the European Union. The views and opinions expressed are those of the authors alone and do not necessarily reflect those of the European Union or the European Cyber Security Centre of Excellence. Neither the European Union nor the European Cyber Security Centre of Excellence can be held responsible for them.