UAT-10608's Automated Credential Grab: Next.js Apps Bleeding Secrets via React2Shell
Credentials pouring out. An automated campaign's hitting vulnerable Next.js setups, siphoning secrets faster than you can say 'patch management.' UAT-10608 doesn't mess around.
Threat DigestApr 07, 20263 min read
⚡ Key Takeaways
UAT-10608 automates credential theft from vulnerable Next.js apps via React2Shell, exploiting SSRF-to-RCE paths.𝕏
Over 15k exposures detected recently; unpatched 13.x versions hit hardest.𝕏
Patch to 14.2.3+, scan with Nuclei, rotate secrets—echoes Log4Shell risks for JS stacks.𝕏
The 60-Second TL;DR
UAT-10608 automates credential theft from vulnerable Next.js apps via React2Shell, exploiting SSRF-to-RCE paths.
Over 15k exposures detected recently; unpatched 13.x versions hit hardest.
Patch to 14.2.3+, scan with Nuclei, rotate secrets—echoes Log4Shell risks for JS stacks.