Log4j caught everyone off guard.
React2Shell might be doing the same right now.
Across thousands of React apps, exposure is already baked in - accelerated by vibe coding and shipped without scrutiny.
In some cases, one request is all it takes.
React2Shell turns that exposure into remote code execution in React and Next.js environments -triggered by a single HTTP POST request.
In this episode of Threat Talks, host Rob Maas and SOC analyst Yuri Wit break down how React2Shell works, why it’s more serious than it looks, and what makes it so easy to exploit.
The risk is significant, and what makes it worse is how little attention it’s getting.
As developers increasingly rely on AI-generated code, applications are being shipped faster - but not always with full visibility into how components behave. That creates blind spots attackers can take advantage of, especially when serialization and deserialization flaws are involved.
We cover how React2Shell works, how attackers exploit serialization and deserialization flaws, and what actions you need to take now to reduce risk.
If your organization runs React or Next.js applications, assume exposure until proven otherwise - especially if this hasn’t been on your radar yet.
React2Shell isn’t making Log4j headlines.
That doesn’t mean the risk is smaller.
Timestamps
00:00 – React2Shell Introduction and Log4j Comparison
00:28 – What Is React and How Vibe Coding Introduces Security Risks
02:48 – How the React2Shell Vulnerability Enables Remote Code Execution
05:49 – How Attackers Exploit React2Shell with a Single POST Request
07:28 – Impact of React2Shell RCE on Server Privileges and Access
08:18 – How to Mitigate React2Shell and the Next.js Vulnerability
11:18 – Incident Response for React2Shell Exploitation
13:25 – Ongoing React2Shell Risk and Why Many Apps Remain Vulnerable
Key Topics Covered
- How the React2Shell and Next.js vulnerability expands the attack surface across modern web applications
- Why vibe coding security risks are accelerating exposure without developers realizing it
- Practical mitigation: patching, EDR detection, WAF limitations, and reducing attack surface
Resources
- Threat Talks: https://threat-talks.com/
- ON2IT (Zero Trust as a Service): https://on2it.net/
- AMS-IX: https://www.ams-ix.net/ams
- Threat Talks episode on Log4j: https://www.youtube.com/watch?v=CiqNmJaak5I
Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.
🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: / @threattalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUE...
► APPLE: https://podcasts.apple.com/us/podcast...
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/
🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
Information
- Show
- FrequencyUpdated Weekly
- PublishedMarch 24, 2026 at 8:59 AM UTC
- Length15 min
- RatingClean
