
April’s exploitation patterns make the problem concrete. CVE-2026-33032, the nginx-ui authentication bypass, landed on Recorded Future’s March exploitation list just two weeks after being patched. CVE-2025-0520, the ShowDoc file upload vulnerability, was exploited for the first time in 2026 despite being patched in 2020. CVE-2026-34621, the Adobe Reader zero-day addressed in an emergency update, appears to have been exploited since November 2025 but only surfaced publicly this month. What links these cases isn’t the age of the vulnerability or exploit sophistication—it’s the gap between when attackers could move and when organizations knew they needed to.
What remains uncertain is whether the patch volume surge represents a permanent shift or a transient spike. Microsoft hasn’t explained the 167-vulnerability release, and while some observers attribute it to AI-driven discovery, the inclusion of nearly 60 Chromium browser vulnerabilities suggests that at least part of the increase reflects dependency republishing rather than novel findings. If AI is driving sustained increases in disclosure volume, organizations will need to rethink not just patch cadence but whether all disclosed vulnerabilities warrant formal assessment. Otherwise security teams will spend more time evaluating threats that never materialize, displacing work that would actually reduce exposure.
The Turkish JanaWare ransomware campaign, operating since 2020 with minimal international visibility, offers a sobering counterpoint. Regional targeting and low ransom demands kept it off the radar of global threat intelligence providers, proof that localized, low-value operations can persist indefinitely if they fall below vendor research thresholds. Organizations with operations in secondary markets should ask whether threat intelligence built on high-profile incidents covers the risks they actually face.
The practical takeaway: organizations need to decouple patching prioritization from exploitation forecasts. A vulnerability absent from the KEV catalog or not flagged by vendors may still be trivial to weaponize, especially if proof-of-concept code is public or the flaw class is well understood. The nginx-ui vulnerability required two HTTP requests and no authentication. The ShowDoc flaw was a file upload issue, a vulnerability class routinely exploited for more than a decade. Both were exploited shortly after disclosure not because attackers developed novel techniques, but because the barriers to exploitation were negligible.
Security leaders should evaluate whether their current patch windows—often 30 days for critical vulnerabilities, longer for others—match a threat environment where exploitation can begin within hours of public disclosure. For internet-facing systems running software with known weaknesses in input validation, authentication bypass, or deserialization, time to remediation may need to be measured in days, not weeks. This isn’t a call for panic patching. It’s recognition that the margin for error has contracted and that deferral carries more risk than it did 18 months ago. Organizations that adjust their patching cadence and exposure management practices will face fewer unplanned incident response engagements than those that don’t.