Ongoing coverage of React2Shell

Miggo logo
Product
Miggo ADR Platform

Protect Every Application You Build or Use

Product
Miggo Know

Know your live applications inside-out

Miggo Prove

Find and prevent the exploitable risks that matter

Miggo Shield

Proactive protection for application threats

See Miggo in Action
RCE detection alert card showing a 9.9 Critical risk score, with an attack path visualization tracing from internet through Cloudflare, Kafka, and a flagged service to a PostgreSQL database with PII, and a fix available indicator.
Book a Demo
Arrow Right
Solutions
Use cases
AI Runtime Vulnerability Prioritization

Attain contextual runtime vulnerability prioritization

Runtime Detection and Response

Respond to attacks in real time

1st and 3rd Party Application Protection

Block vulnerability exploitation

Secure AI Applications

Runtime security for agentic AI

Block AI Attacks with Custom WAF Rule

Instant defense with Miggo WAF Copilot

industries
Health
Technology
Financial Services
Resources
Resources
React2Shell

Live Coverage of the Exploit

Blog

The lastest on products and research

Reports and Webinars

Access the latest reports and webinars

News

Company announcements and press

Academy

A knowledge hub for AI and Application Security

Predictive Vulnerability Database

Access the new Predictive Vulnerability Database

Predictive Vulnerability Database

Short description here

fEATURED
Red Herrings and AI Slop: Debunking React2Shell Misinformation
Red Herrings and AI Slop: Debunking React2Shell Misinformation
More From Our Blog
Company
Book a Demo
Arrow Right
Book a Demo
Arrow Right
Photo of Liad Eliyahu
AUTHOR

Liad Eliyahu

Head of Research
Back to the Blog
Red Herrings and AI Slop: Debunking React2Shell Misinformation

Red Herrings and AI Slop: Debunking React2Shell Misinformation

Research
React2Shell sparked confusion, bad PoCs, and wrong assumptions. Here’s a clear look at what really happened—and what the vulnerability actually is.
Read More

React2shell: CVE-2025-55182 Technical Breakdown

Research
This post breaks down how the React2Shell (CVE-2025-55182) vulnerability enables RCE through a complex prototype traversal and deserialization exploit
Read More

React2shell: CVE-2025-55182 Critical RCE Vulnerability in React and Next.js

Research
Critical React and Next.js flaws expose apps to unauthenticated attacks. Learn what happened, what’s at risk, and how to protect your environment.
Read More
A Fourth of July Runtime Security Report

From Celebrations to Cyber-Saves: A Fourth of July Runtime Security Report

Research
Cyber threats don't rest. Read Miggo's exclusive report featuring attacks on Confluence & Langflow, and see how AI-powered ADR defense works.
Read More
Miggo presenting ALBeast insights at RSAC 2025

Beauty and the ALBeast: Miggo Takes the Stage at RSAC 2025

Conferences
At RSAC 2025, Miggo revealed “ALBeast,” an AWS ALB flaw hitting 15K+ systems. See how it challenges the Shared Responsibility Model and what to do now
Read More
Uncovering hidden threats with Miggo ADR

Going Beyond the Code to Uncover Hidden Threats with Miggo’s ADR

Research
Learn how Miggo uses AI and AppDNA to detect zero-day threats, runtime exploits, and hidden posture risks across your live cloud-native applications
Read More
Introducing a New Way to Track AWS Documentation Changes

Introducing a New Way to Track AWS Documentation Changes

Research
Track security changes in AWS docs with Miggo’s new Security Docs Change Engine - a single place to stay updated and maintain security standards.
Read More

The Hunt for ALBeast: A Technical Walkthrough

Research
Miggo’s inside visibility into app behavior enabled Miggo Research to uncover and address the ALBeast vulnerability affecting thousands.
Read More
Miggo Uncovers Critical Auth Bypass in UK Government System | CVE-2025-25182

Miggo Uncovers Critical Auth Bypass in UK Government System | CVE-2025-25182

Research
GCHQ confirms Miggo discovered a 9.4 critical CVE-2025-25182 in Stroom, allowing attackers to bypass authentication and authorization.
Read More
1

Detect and Respond To Threats Faster.

Checkmark icon

POC success = 100%

Checkmark icon

AI services mapped, ~1% exploitable

Checkmark icon

1‑click protection enabled

Book a Demo
Arrow Right
Miggo Security logo
COMPANY
About Miggo
Careers
PRODUCT
Miggo Know
Miggo Prove
Miggo Shield
Miggo ADR
SOLUTIONS
AI Runtime Vulnerability Prioritization
1st and 3rd Party Application Protection
Runtime Detection and Response
Block AI Attacks with Custom WAF Rule
Secure AI Applications
RESOURCES
React2Shell
Blog
Reports and Webinars
News
Academy
Predictive Vulnerability Database
Legal
Terms of Use
Privacy Policy
© 2025 Miggo Security
AICPA SOC badgeMiggo Security - Latio Cloud Security Innovator 2025 Award BadgeGartner® Cool Vendor in AI Security Award BadgeMiggo Security - Frost & Sullivan’s 2025 Global New Product Innovation Recognition Award BadgeAI Trustworthy Pledge 2025 badgeAvailable in AWS Marketplace badge