JavaScript/Node.js Ecosystem Vulnerabilities: Next.js React2Shell Exploitation and Prototype-Pollution/DoS Bugs in Axios and CASL
Threat actors began actively exploiting React2Shell (CVE-2025-55182), a critical issue affecting Next.js and React Server Components that can enable unauthenticated remote code execution on vulnerable, internet-facing servers. Reporting describes exploitation starting within ~20 hours of public disclosure, with attacks observed as malicious HTTP POST requests targeting routes such as /_next/server and /_next/flight, abusing server-component serialization to inject commands into the application runtime. WhoisXMLAPI attributed a large share of scanning/exploitation activity to the “ILOVEPOOP” toolkit, which used centralized infrastructure (noted as high-traffic nodes hosted in the Netherlands), rotating scanner nodes, and a distinctive request fingerprint including non-standard headers like X-Nextjs-Request-Id: poop1234 and Next-Action: x.
Separately, two additional JavaScript supply-chain/library vulnerabilities were disclosed that can be triggered via attacker-controlled input in Node.js applications. Axios is affected by a high-severity denial-of-service flaw (CVE-2026-25639, CVSS 7.5) in mergeConfig, where a configuration object containing an own __proto__ property can cause a TypeError and crash the Node.js process when user input is parsed (e.g., via JSON.parse()) and passed into Axios configuration. CERT/CC also published VU#458422 for a prototype pollution vulnerability in CASL Ability (versions 2.4.0–6.7.4) in rulesToFields() / setByPath() (extra module), where insufficient sanitization of path segments allows writing to Object.prototype via special keys (e.g., prototype, constructor, and _proto_), potentially enabling broad application compromise up to arbitrary code execution depending on how polluted properties are later used.
How this story unfolded
9 events from the most recent confirmed update back to the earliest known activity.
Axios CVE-2026-42041 validateStatus pollution flaw is disclosed
A new Axios vulnerability, CVE-2026-42041, was disclosed involving the mergeDirectKeys configuration merge strategy. Because Axios checked validateStatus with the JavaScript in operator, a polluted Object.prototype.validateStatus could be treated as user-supplied, allowing a malicious response validator that could enable authentication or response-handling bypass.
Axios CVE-2026-42035 header injection flaw is disclosed
A new Axios vulnerability, CVE-2026-42035, was disclosed involving prototype pollution in adapter logic that duck-types FormData objects. By inheriting append, getHeaders, and Symbol.toStringTag from a polluted Object.prototype, a plain object can be misclassified as FormData and trigger attacker-controlled header processing.
Axios CVE-2026-40175 disclosed and patched in version 1.15.0
A critical Axios vulnerability, CVE-2026-40175, was disclosed affecting versions prior to 1.15.0 due to improper HTTP header sanitization in the Node.js HTTP adapter. The issue can let prototype-polluted properties reach request headers, enabling request smuggling, metadata exfiltration, IAM credential theft, and possible cloud account takeover; Axios 1.15.0 was identified as the patched release.
Axios maintainers release fixes for CVE-2026-25639
Axios maintainers released updates to address the mergeConfig crash issue affecting Node.js servers that pass untrusted input into Axios configuration merging. Users were urged to upgrade to version 1.13.4 or later, with 1.13.5 specifically noted as restoring stability.
Axios DoS vulnerability CVE-2026-25639 is reported
A high-severity denial-of-service flaw in Axios, tracked as CVE-2026-25639 and scored CVSS 7.5, was reported. The issue in mergeConfig can trigger a TypeError and crash Node.js processes when a configuration object contains __proto__ as an own property.
CERT/CC publishes advisory on CASL Ability prototype pollution flaw
CERT/CC published vulnerability note VU#458422 covering a prototype pollution vulnerability in CASL Ability. No further synopsis details were provided in the reference.
WhoisXMLAPI attributes React2Shell activity to ILOVEPOOP toolkit
Analysts linked a large share of the React2Shell exploitation activity to a toolkit called ILOVEPOOP. The toolkit was described as using centralized infrastructure based on two high-traffic servers in the Netherlands, rotating scanner nodes, and distinctive HTTP headers for detection.
Exploitation of React2Shell begins within about 20 hours
Attackers began exploiting internet-facing systems shortly after public disclosure, using malicious HTTP POST requests to routes such as /_next/server and /_next/flight. Early activity included high-volume scanning to find exposed targets before they could be patched.
React2Shell vulnerability publicly disclosed
The critical Next.js and React Server Components flaw dubbed React2Shell, tracked as CVE-2025-55182, was publicly disclosed. The bug enables unauthenticated remote code execution via abuse of server component serialization.
Related entities
Vulnerabilities, threat actors, malware, products, organizations, and breaches Mallory has linked to this story.
Sources
8 references tracked. Mallory keeps watching after this page renders.
CVE-2026-42041: CVE-2026-42041: Prototype Pollution Gadget in Axios Leading to Authentication Bypass | CVEReports
cvereports.com
Open sourceCVE-2026-42035: CVE-2026-42035: Axios Header Injection via Prototype Pollution Gadget | CVEReports
cvereports.com
Open sourceAxios CVE-2026-40175: a critical bug that’s… not exploitable
aikido.dev
Open sourceCritical Axios Vulnerability Allows Remote Code Execution - PoC Released
cybersecuritynews.com
Open sourceCVE-2026-40175 | Mondoo Vulnerability Intelligence
mondoo.com
Open sourceILOVEPOOP Toolkit Exploiting React2Shell Vulnerability to Deploy Malicious Payload
cybersecuritynews.com
Open sourceHTTP Down: High-Severity Axios Flaw (CVSS 7.5) Crashes Node.js Servers
securityonline.info
Open sourceVU#458422 - CASL Ability contains a prototype pollution vulnerability
kb.cert.org
Open sourceSee the full picture, correlated to your attack surface.
Map indicators from this story to your assets and identify affected systems in minutes.
Every observed campaign, victim, and pivot linked to actors named in this story.
Malware, exploits, and IOCs connected to the activity described here.
YARA, Sigma, and Snort rules deployed to your SIEM as soon as they’re published.
Get matching new stories delivered to your team as they break — not the next morning.
Ask questions about this story and take action on the answers.



