Security Experts Warn WAFs Can’t Prevent Attacks from the Latest react2shell Exploit

Security Experts Warn WAFs Can’t Prevent Attacks from the Latest react2shell Exploit
Security Experts Warn WAFs Can’t Prevent Attacks from the Latest react2shell Exploit
A new report from Miggo Security highlights a critical weakness in how Web Application Firewalls (WAFs) handle modern-day exploits, warning that traditional defenses cannot keep up with AI-driven threats such as the recently discovered React2Shell vulnerability (CVE-2025-55182).

WAFs Struggle to Contain AI-Backed Exploits

Miggo Security’s new study, “Beat the Bypass: A Benchmark Study of WAF Weaknesses and AI Mitigation,” analyzes over 360 CVEs across leading WAF vendors and reveals that more than half of all exploits can still bypass default WAF defenses.

Specifically, 52% of vulnerabilities evaded detection, even under favorable testing conditions. The React2Shell zero-day affecting popular JavaScript frameworks React and Next.js exposes a central blind spot in standard WAF signature models.

The flaw, rated CVSS 10.0, lies in the deserialization logic of the “Flight” protocol, a layer that is rarely monitored by traditional WAFs.

According to Miggo, this makes companies especially vulnerable during the “exposure window,” the gap between the discovery of an exploit and vendors’ rollout of a WAF-specific security rule.

Andy Ellis, former Chief Security Officer at Akamai, said the findings prove why WAFs are “underutilized assets.”

He explained that waiting an average of 41 days for vendors to release updated CVE rules poses a significant risk.

“Runtime augmentation provides the automation and intelligence needed to transform the WAF into a reliable, high-confidence defense layer for all critical CVEs not just reactive fixes,” Ellis said.

AI-Driven Runtime Defense Shortens the Exposure Window

Miggo’s benchmark study further shows that AI-generated, vulnerability-specific rules can block up to 91% of bypass attempts, nearly doubling the effectiveness of traditional approaches.

By integrating runtime intelligence directly at the WAF level, defense systems can automatically adapt to the unique context of each exploit rather than relying on generic signatures.

Daniel Shechter, CEO and co-founder of Miggo Security, emphasized that the React2Shell exploit is a “textbook example” of why outdated rule-based WAFs fail to meet today’s speed of attack.

“We’re now facing AI-able adversaries who operate in hours, not weeks. The only viable defense is one that learns and adapts instantly,” he said.

The report estimates that mid-sized enterprises lose up to $6 million annually due to operational WAF deficiencies stemming from false positives, delayed rule updates, and extended remediation windows.

Miggo’s AI-augmented model aims to cut exposure windows by 99% and reduce overhead by nearly one-third.

As AI-fueled attackers exploit vulnerabilities faster than ever, experts agree the industry faces a turning point: it’s no longer enough for WAFs to detect threats; they must evolve to think like defenders.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Security Experts Warn WAFs Can’t Prevent Attacks from the Latest react2shell Exploit appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading