April 11, 2026 Cyber Trends
On December 10, 2025, reporting confirmed what defenders already suspected: the React Server Components (RSC) vulnerability (CVE-2025-55182, “React2Shell”) has moved from “patch fast” to “assume scanning and attempted exploitation is already happening.”
Security teams are now responding to a growing number of suspected compromises across multiple sectors.
React2Shell is a pre-auth, remote code execution issue caused by unsafe deserialization of payloads sent to React Server Function endpoints in React Server Components.
Public internet exposure is large: Shadowserver reported 165,000+ IPs and 644,000 domains with potentially vulnerable code after improving scan targeting.
By the time “how many are exposed?” was being debated, defenders were already seeing impact: Palo Alto Networks reported post-exploitation activity observed at 50+ organizations, spanning media, financial services, technology, and government, among others.
Why this one escalated so fast
Exploit economics are perfect: unauthenticated RCE + widely deployed modern web stacks + internet-facing endpoints.
Downstream blast radius: RSC is embedded across popular frameworks/bundlers (including Next.js and others), so exposure isn’t limited to teams who think they “just use React.”
Threat actor pile-on: reporting ties early activity to China-nexus groups, with broader opportunistic and follow-on activity observed by multiple research teams.
Operational noise creates misses: security teams get pulled into “are we affected?” debates while scanners move straight to exploitation.
InfoSight take
Treat this like an incident class, not a “patch Tuesday” task.
The failure mode we see repeatedly in real environments is not “no patch exists.” It’s this:
- teams patch some systems,
- miss one internet-exposed instance (or a CI/CD artifact, old container, or sidecar),
- skip compromise checks because “we mitigated,”
- attackers maintain access through basic persistence.
CISA explicitly told teams to check for signs of compromise on internet-accessible React instances after applying mitigations—that’s the correct mental model.
What to do now (practical, defensive order)
1) Confirm exposure (inventory > assumptions).
Identify every internet-accessible application path that could be running vulnerable RSC packages (including containers, blue/green deployments, preview environments).
2) Patch to known-fixed versions immediately.
React’s guidance: upgrade vulnerable RSC packages to 19.0.1 / 19.1.2 / 19.2.1 (as applicable).
Also account for follow-on fixes: additional advisories and patched versions (including later 19.0.3 / 19.1.4 / 19.2.3 for a DoS issue tied to incomplete fixes) reinforce that this is an active hardening cycle, not a one-and-done.
3) Assume attempted exploitation; do compromise checks.
Do not treat “patched” as “clean.” Use server/app telemetry to hunt for:
unexpected process execution from the web worker context,
new/unknown binaries or scripts,
outbound connections from web tiers to unfamiliar infrastructure,
credential and config file access patterns atypical for the app role.
(These post-exploitation behaviors are consistent with what multiple researchers described in observed campaigns.)
4) Contain exposure while patching rolls through.
If an instance cannot be patched immediately, reduce attack surface:
temporarily restrict access to relevant endpoints,
enforce network-layer allowlisting where feasible,
add compensating controls (WAF rules can help, but do not treat them as sufficient).
5) Validate that “fixed” is actually deployed.
Confirm runtime package versions in production images and running containers. CI/CD drift is how “we patched” becomes “we patched the repo but not the fleet.”
Bottom line:
React2Shell is a textbook example of modern risk: a framework-level flaw becomes an internet-scale event because deployment patterns spread faster than inventory accuracy. The correct response is patch + hunt, with verification that fixes are actually running in production.
Subscribe to our newsletter to keep you updated on the latest cybersecurity insights & resources.
One follow-up from a security expert—no spam, ever.
Enter your details below to download the PDF.