Play AppSec WarGames
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
In December 2025, a critical security vulnerability with a CVSS base score of 10.0 (the maximum) was disclosed: React2Shell (CVE-2025-55182), a remote code execution flaw in React Server Components / Flight implementations, as used by frameworks like Next.js.
React2Shell abuses how the Flight protocol deserialises data from clients. By crafting a malicious request to a special endpoint (for example /_rsc), attackers can trick the server into executing attacker-controlled JavaScript.
The disclosure was quickly followed by exploitation by multiple threat actor groups. Several threat intelligence teams have already tied some of this activity to state-associated actors.
We’ve turned this vulnerability and incident into a hands-on incident response challenge on SecDim.
The scenario drops you into a compromised React/Next.js environment with:
console.log(50) and errors from react-server-dom-webpacknode → PowerShell → Cobalt Strike / Snowlight / VshellYour mission is to reconstruct the attack chain, identify Indicators of Compromise (IoCs), and map everything back to MITRE ATT&CK.
Best of all, you can play it for free in:
Incident Response catalogue
https://play.secdim.com/game/incident-response
Spin it up, follow the logs, and see how fast you can spot the React2Shell foothold before it turns into a full-blown cloud compromise.
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.
Read more