Tap to Trade in Gate Square, Win up to 50 GT & Merch!
Click the trading widget in Gate Square content, complete a transaction, and take home 50 GT, Position Experience Vouchers, or exclusive Spring Festival merchandise.
Click the registration link to join
https://www.gate.com/questionnaire/7401
Enter Gate Square daily and click any trading pair or trading card within the content to complete a transaction. The top 10 users by trading volume will win GT, Gate merchandise boxes, position experience vouchers, and more.
The top prize: 50 GT.
 disclosed a rising trend of attacks involving the injection of cryptocurrency theft programs into websites through vulnerabilities in the open-source front-end JavaScript library React. React is primarily used for building user interfaces and is widely applied in web applications. On December 3, the React team disclosed that white-hat hacker Lachlan Davidson discovered a security vulnerability in the software that allows unauthenticated remote code execution, enabling attackers to implant and run malicious code. SEAL pointed out that malicious actors are exploiting this vulnerability (CVE-2025-55182) to secretly inject wallet-clearing code into cryptocurrency websites.
React released a fix for the CVE-2025-55182 vulnerability on December 3 and recommends all users of react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack to upgrade immediately to eliminate the vulnerability. The team added: “If the application’s React code does not use server-side components, it is not affected by this vulnerability; similarly, if the application does not use frameworks, bundling tools, or bundling plugins that support React server-side components, it is also not affected.”