This blog post discusses the discovery of rule evasion techniques targeting WAF protections specific to React2Shell (CVE-2025-55182), a remote code execution (RCE) vulnerability. These evasion methods successfully bypass the default WAF rules implemented by Cloudflare and several other major web application firewalls. The analysis focuses on identifying how attackers exploit weaknesses in the default configurations to bypass security defenses. Publicly available updated rules have been developed and released to address these evasion techniques and strengthen protection against attacks targeting this vulnerability. The goal is to enhance security without causing disruptions to legitimate traffic. The post explains the nature of the React2Shell vulnerability, the evasion strategies employed, and the proactive steps taken by WAF vendors and security communities to improve rule sets and maintain robust defenses.
? Rule evasion detected in Cloudflare and other major WAFs. Updated rules are available for public usage.
We analyzed WAF protections for React2Shell (CVE-2025-55182) and confirmed multiple evasion techniques that bypass default rules on major platforms. Our goal here isn’t… pic.twitter.com/B15CPvH91R
— Miggo Security (@MiggoSecurity) December 10, 2025