NIS2 compliance in 2025: What React2Shell and new React RSC bugs reveal about EU cyber risk
Across Europe this week, urgent security advisories about React2Shell, React Server Components vulnerabilities, and a GeoServer XXE flaw landed on the desks of security leaders. For regulated entities, these exploits are not just technical headaches—they’re concrete tests of NIS2 compliance. In today’s Brussels briefing with policymakers and industry, the refrain was clear: the EU expects risk-based controls, fast patching, and disciplined incident reporting—no excuses.

As I’ve heard repeatedly from CISOs this quarter, vulnerability velocity is outpacing traditional processes. That’s precisely why NIS2 compliance must be operational, not a policy binder on a shelf. Below, I break down what this week’s exploit wave means for EU regulations, how to align GDPR and NIS2, and the practical steps that banks, fintechs, hospitals, utilities, telecoms, MSPs, and SaaS providers can take now.
The week in exploits—and why it matters for NIS2 compliance
Headlines in the past 48 hours flagged three trends that cut straight to NIS2 obligations:
- React2Shell exploitation escalated into large-scale attacks, prompting emergency mitigations. This is classic supply chain and web app exposure—terrain NIS2 explicitly pulls into scope via software lifecycle controls and third-party risk.
- New React Server Components (RSC) vulnerabilities enable denial-of-service and, in some cases, source code exposure, raising the risk of leaking secrets and personal data embedded in code or templates.
- A geospatial platform (GeoServer) XXE flaw entered a “known exploited” list—evidence that old classes of bugs still cause real-world impact.
For EU operators, these are not theoretical. Under NIS2, essential and important entities must demonstrate vulnerability management, incident handling, business continuity, and supply chain security. If a React2Shell chain causes a major service disruption or exposes personal data, you may trigger both NIS2 incident reporting and GDPR breach notification. A CISO I interviewed this morning put it bluntly: “We discovered that our incident communications plan was slower than the exploit. NIS2 assumes you’ll fix that.”
What NIS2 actually requires—beyond checklists
For the avoidance of doubt, NIS2 is not a “GDPR for security.” It’s a directive that EU countries have now transposed, with enforcement ramping up through 2025. Core requirements include:
- Risk management and governance: documented risk assessments, policies approved by leadership, and accountability at the management level.
- Technical and operational measures: patching and vulnerability handling, secure development practices, MFA, network segmentation, logging and monitoring, encryption, backups and disaster recovery.
- Supply chain security: due diligence for third parties and open-source dependencies; transparency such as SBOMs; contractual controls and assurance.
- Incident reporting: early warning within 24 hours for significant incidents, a 72-hour notification with updates, and a final report within one month.
- Testing and auditing: security audits, penetration testing, and exercises to validate controls.

The point is not paperwork—it’s measurable resilience. This week’s React-related bugs and the GeoServer XXE flaw are precisely the sort of high-velocity issues your program must detect, triage, patch, and report against, on the clock.
GDPR vs NIS2: Two lenses on the same crisis
When an exploit leaks source code or enables data extraction through server-side bugs, two regimes may apply: GDPR for personal data breaches; NIS2 for network and information system incidents affecting service. Regulators care that you manage both dimensions.
| Topic | GDPR | NIS2 |
|---|---|---|
| Scope | Personal data processing by controllers/processors | Security of network and information systems for essential/important entities |
| Primary goal | Data protection and privacy rights | Service resilience and cybersecurity risk reduction |
| Incident trigger | Personal data breach | Significant incident affecting service provision |
| Reporting timeline | Supervisory authority within 72 hours if risk to rights/freedoms; data subjects without undue delay if high risk | Early warning within 24 hours; 72-hour notification; final report within 1 month |
| Fines (indicative) | Up to €20m or 4% global annual turnover | Member-state specific; up to ~€10m or 2% turnover in many transpositions |
| Leadership liability | Governance and accountability duties | Explicit management accountability; possible temporary bans and personal liability in some countries |
| Supply chain | Processor obligations and contracts | Broader software supply-chain risk management and assurance |
| Security controls | Risk-based; no fixed list | Enumerated categories (patching, incident handling, business continuity, etc.) with expectations for evidence |
From exploit to audit evidence: closing the loop
EU regulators will increasingly ask for proof: how quickly did you detect the issue, who triaged it, when was it patched, how were customers informed, and what lessons were logged? That means sharp processes for collecting timelines, screenshots, logs, and communications—without leaking confidential data along the way.
Secure documentation and evidence handling
- Redact and anonymize personal data, secrets, and keys before sharing tickets, Slack excerpts, or code snippets with auditors or external partners. Professionals avoid risk by using Cyrolo’s anonymizer at www.cyrolo.eu.
- Use secure document uploads for incident reports, pen test PDFs, and risk registers so material doesn’t spill into uncontrolled tools. Try secure document uploads at www.cyrolo.eu — no sensitive data leaks.
- Keep a clear chain-of-custody for evidence. Store versions and access logs for audits.
When uploading documents to LLMs like ChatGPT or others, never include confidential or sensitive data. The best practice is to use www.cyrolo.eu — a secure platform where PDF, DOC, JPG, and other files can be safely uploaded.

Practical steps: turn NIS2 requirements into action
Here is what I see working at organizations that stay ahead of exploit waves:
- Asset and exposure inventory: enumerate all internet-facing services, especially modern web stacks (React/Next.js, Node.js, Java/Spring, PHP) and geospatial/GIS tools. Tie assets to owners.
- Exploit-driven SLAs: set patch timelines based on KEV listings and active exploitation intelligence. Hotfix first; then refactor and harden.
- SDLC guardrails: apply SAST/DAST/SCA, secret scanning, IaC scanning, and dependency pinning. Maintain SBOMs to quickly identify exposure to frameworks like React.
- Runtime protection: enable WAF rulesets, rate limiting, and RASP where appropriate; monitor for SSRF/XXE patterns and anomalous outbound calls.
- Secrets hygiene: rotate credentials after source exposure; enforce least privilege and vault-based distribution.
- Logging that matters: centralize logs with retention aligned to national transposition; ensure you can reconstruct attack timelines.
- Incident drills: practice the 24h/72h/1-month reporting flow. Timebox technical analysis vs. communications; pre-approve plain-language templates.
- Third-party diligence: require vendors to share SBOMs and CVD policies; verify patch practices; insert contractual audit rights.
- Business continuity: test backup restores and failover for critical services; ensure RPO/RTO match regulatory expectations.
- Documentation discipline: anonymize and securely share audit artefacts through www.cyrolo.eu to avoid accidental GDPR violations.
NIS2 compliance checklist
- Map essential/important entity status and in-scope services.
- Document risk management governance and management accountability.
- Implement vulnerability management with exploit-aware prioritization.
- Define and test incident reporting workflows (24h/72h/1-month).
- Harden SDLC with SAST/DAST/SCA, SBOMs, and dependency controls.
- Strengthen identity: MFA, privileged access management, and segmentation.
- Log, monitor, and retain evidence suitable for audits.
- Assess and contractually manage supply-chain risk.
- Backups, DR, and failover validated via exercises.
- Use anonymization for evidence and secure document uploads for sharing via www.cyrolo.eu.
Leadership and accountability: what boards and CISOs must do now
Board members and executives are firmly in scope under NIS2 transpositions. Regulators and auditors will ask for proof that leadership:
- Sets risk appetite and funds remediation at the speed of exploitation.
- Reviews metrics: time-to-detect, time-to-contain, time-to-patch, and vendor remediation lag.
- Approves and periodically reviews incident reporting and business continuity strategies.
- Ensures staff are trained, vendors are vetted, and tabletop exercises include comms/legal.

One EU regulator told me this autumn, “If the board sees the patch backlog as ‘IT plumbing,’ they have already failed.” Make the exploit-to-remediation cycle as visible as financial KPIs.
FAQs: NIS2 and today’s exploit landscape
What is the NIS2 compliance deadline and who is in scope?
NIS2 was transposed by EU Member States from October 2024 onwards, with enforcement building through 2025. It covers “essential” and “important” entities across sectors like energy, transport, finance, health, digital infrastructure, public administration, and many digital providers, including certain SaaS and MSPs. Check your national law and sector-specific thresholds.
How does NIS2 interact with GDPR during a web application breach?
If personal data is exposed, GDPR breach notification may be required in parallel with NIS2 incident reporting. Treat incidents with dual lenses: protect individuals’ data and restore service continuity. Maintain separate but coordinated playbooks.
How should we prioritize vulnerabilities like React2Shell or RSC bugs?
Use exploitability signals: active exploitation, inclusion on “known exploited” lists, internet exposure, and sensitive data proximity. Implement emergency SLAs, pre-approved mitigations (WAF rules, feature flags), and post-patch hardening. Record decisions for audit trails.
Do we need a Coordinated Vulnerability Disclosure (CVD) policy under NIS2?
NIS2 encourages vulnerability handling maturity, and many sectors expect CVD. Publish a clear policy, provide intake channels, and define internal triage. This also helps with supply-chain trust.
How can we share audit evidence without violating privacy?
Redact personal data and secrets before sharing. Use an AI anonymizer and secure document uploads to prevent leaks—teams across Europe rely on www.cyrolo.eu for both.
Conclusion: Turning NIS2 compliance into competitive resilience
This week’s exploit surge is a preview of 2025: faster chains, broader blast radius, tighter reporting clocks. Organizations that treat NIS2 compliance as a living operating model—not a checkbox—will absorb shocks better, avoid fines, and earn regulator trust. Make evidence handling and privacy-first sharing a default: anonymize sensitive artefacts and route all document uploads through www.cyrolo.eu. Professionals across regulated sectors are already cutting breach risk by using Cyrolo’s anonymizer at www.cyrolo.eu. In an era of React2Shell-class exploits, that’s how you keep your promises—to customers, regulators, and your board.
