Skip to main content
Should You Rely on Your Scanner to Catch the Next Critical Framework Bug?Guides
5 min readFor Security Engineers

Should You Rely on Your Scanner to Catch the Next Critical Framework Bug?

The Question at Hand

React2Shell landed with two CVEs (CVE-2025-55182 and CVE-2025-66478), both scoring a perfect 10.0 on CVSS. Within days, PortSwigger added detection capabilities into Burp Suite's default scans for Next.js applications. No extension required, no custom configuration—just update and scan.

This raises a fundamental question for security teams: Should you depend on your existing tools to automatically detect emerging framework vulnerabilities, or do you need a separate rapid-response process?

Your answer determines whether you're running emergency scans this week or whether your scheduled pipeline already caught React2Shell before you finished your morning coffee.

The Case for Tool-Integrated Detection

Relying on your scanner offers speed at scale.

When Burp Suite added React2Shell detection to its default scans, teams using it gained immediate coverage across their entire Next.js footprint. No need to research the vulnerability mechanism, write custom detection logic, or train analysts on new attack patterns. Your existing scan schedule—whether it's nightly CI/CD runs or weekly penetration tests—now includes this check.

Operationally, this is significant. If you scan 200 applications monthly, manually investigating each one for React2Shell would take weeks. Automated detection completes the same work in hours, with consistent coverage. You get uniform reporting, integration with your existing ticketing workflows, and evidence for compliance documentation without additional process overhead.

The model also scales with your security maturity. Junior engineers can run the scans. Your AppSec team doesn't need to become Next.js internals experts overnight. The tool vendor bears the burden of understanding the vulnerability's technical nuances and translating that into reliable detection logic.

For compliance frameworks like PCI DSS v4.0.1 Requirement 6.2.3, which mandates timely patching of critical vulnerabilities, automated detection provides documented evidence that you identified affected systems within your assessment window. The scan reports become your audit trail.

The Case for Independent Response Processes

The counterargument focuses on the gap between disclosure and tool coverage.

React2Shell detection appeared in Burp Suite quickly, but "quickly" still means days after public disclosure. In that window, your applications were vulnerable and your scanner was blind. If you waited for tool updates before investigating, you gave attackers a head start.

Framework vulnerabilities spread fast because they affect thousands of applications simultaneously. Automated scanners are excellent at finding what they're programmed to detect—but they can't find what they don't know about yet. Relying exclusively on tool updates means accepting that window of exposure as inevitable.

The alternative is maintaining parallel capabilities: vulnerability researchers who can analyze new disclosures, assess whether your stack is affected, and develop interim detection methods before vendor tools catch up. This might be grep patterns for specific code constructs, targeted manual testing of suspected vulnerable endpoints, or temporary instrumentation in your runtime environment.

You also face the accuracy question. Automated tools optimize for broad coverage, which sometimes means false positives. When Burp Suite flags a potential React2Shell instance, you still need someone who understands the vulnerability well enough to validate the finding. If your team depends entirely on the tool and lacks that knowledge, you're either chasing false positives or missing nuanced true positives that require manual confirmation.

From a framework perspective, NIST CSF v2.0's Detect function emphasizes continuous monitoring and anomaly detection—not just periodic scanning. Relying solely on scheduled scans means you're checking for React2Shell weekly or monthly, not continuously. An independent process can implement runtime monitoring, WAF rule updates, or log analysis that provides detection between scan cycles.

Where Practitioners Actually Land

Most teams operate in a hybrid model, though they don't always formalize it.

Your scanner handles the baseline. When PortSwigger adds React2Shell detection, you run it across your application inventory as part of your regular cadence. This catches the obvious cases and provides coverage for applications that aren't on your critical path.

But for high-value applications—your payment processing system, your customer data platform, anything that would make your CISO's phone ring at 2 AM—you don't wait. Your AppSec team investigates immediately based on the CVE details, identifies potentially affected components through dependency analysis, and validates exposure manually if needed.

The division of labor matters. Your scanner scales to hundreds of applications. Your senior engineers focus on the dozen that matter most. Neither approach works alone for organizations of any size.

The tooling also evolves. Teams using Burp Suite in CI/CD pipelines get faster feedback than those running weekly manual scans. If your scanner runs on every pull request, the gap between tool update and detection narrows significantly. You're still not catching zero-day exposure, but you're preventing new vulnerable code from reaching production.

Our Take

Depend on your scanner for coverage, but don't depend on it for speed.

Integrated detection like Burp Suite's React2Shell checks solves the scale problem. You cannot manually investigate every application for every new vulnerability—the math doesn't work. Automated tools provide the consistent, repeatable coverage that compliance frameworks require and that operational reality demands.

But critical vulnerabilities require critical response. When something scores 10.0 and affects a framework in your stack, waiting for your next scheduled scan is a choice to accept unnecessary risk. Your process should include immediate assessment of high-severity disclosures, identification of affected systems through asset inventory, and manual validation for critical applications.

The practical implementation: maintain a tiered response. Severity 10.0 in your framework stack triggers immediate investigation for production systems. Your scanner handles everything else in its normal cycle. Document both processes for audit purposes—NIST 800-53 Rev 5 control SI-2 (Flaw Remediation) requires you to demonstrate timely identification and remediation of security flaws.

One more consideration: if your scanner is your only detection mechanism, you're creating a single point of failure in your security program. Tool vendors are generally reliable, but they're not infallible. A detection capability that you understand and can implement independently—even if it's less elegant than the vendor's solution—provides resilience when you need it most.

The React2Shell integration in Burp Suite is valuable precisely because it reduces the operational burden of vulnerability management. Use it. But don't let its convenience replace the judgment and urgency that critical vulnerabilities demand.

CVE Details

Topics:Guides

You Might Also Like