You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/blog/2025/12/03/critical-security-vulnerability-in-react-server-components.md
+15-10Lines changed: 15 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,13 +62,15 @@ An unauthenticated attacker could craft a malicious HTTP request to any Server F
62
62
63
63
These instructions have been updated to include the new vulnerabilities:
64
64
65
-
-**Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) (CVSS 7.5)
65
+
-**Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184)and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779)(CVSS 7.5)
66
66
-**Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
67
-
68
-
They also include the additional case found, patched, and disclosed as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).
67
+
-**Denial of Service - High Severity**: January 26, 2026 [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864) (CVSS 7.5)
69
68
70
69
See the [follow-up blog post](/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components) for more info.
71
70
71
+
-----
72
+
73
+
_Updated January 26, 2026._
72
74
</Note>
73
75
74
76
### Next.js {/*update-next-js*/}
@@ -77,18 +79,21 @@ All users should upgrade to the latest patched version in their release line:
77
79
78
80
```bash
79
81
npm install next@14.2.35 // for 13.3.x, 13.4.x, 13.5.x, 14.x
80
-
npm install next@15.0.7 // for 15.0.x
81
-
npm install next@15.1.11 // for 15.1.x
82
-
npm install next@15.2.8 // for 15.2.x
83
-
npm install next@15.3.8 // for 15.3.x
84
-
npm install next@15.4.10 // for 15.4.x
85
-
npm install next@15.5.9 // for 15.5.x
86
-
npm install next@16.0.10 // for 16.0.x
82
+
npm install next@15.0.8 // for 15.0.x
83
+
npm install next@15.1.12 // for 15.1.x
84
+
npm install next@15.2.9 // for 15.2.x
85
+
npm install next@15.3.9 // for 15.3.x
86
+
npm install next@15.4.11 // for 15.4.x
87
+
npm install next@15.5.10 // for 15.5.x
88
+
npm install next@16.0.11 // for 16.0.x
89
+
npm install next@16.1.5 // for 16.1.x
87
90
88
91
npm install next@15.6.0-canary.60 // for 15.x canary releases
89
92
npm install next@16.1.0-canary.19 // for 16.x canary releases
Copy file name to clipboardExpand all lines: src/content/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components.md
+40-16Lines changed: 40 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,8 @@ description: Security researchers have found and disclosed two additional vulner
9
9
10
10
December 11, 2025 by [The React Team](/community/team)
11
11
12
+
_Updated January 26, 2026._
13
+
12
14
---
13
15
14
16
<Intro>
@@ -23,7 +25,7 @@ Security researchers have found and disclosed two additional vulnerabilities in
23
25
24
26
The new vulnerabilities are disclosed as:
25
27
26
-
-**Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) (CVSS 7.5)
28
+
-**Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184), [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779), and [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864) (CVSS 7.5)
27
29
-**Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
28
30
29
31
We recommend upgrading immediately due to the severity of the newly disclosed vulnerabilities.
@@ -32,12 +34,16 @@ We recommend upgrading immediately due to the severity of the newly disclosed vu
32
34
33
35
#### The patches published earlier are vulnerable. {/*the-patches-published-earlier-are-vulnerable*/}
34
36
35
-
If you already updated for the Critical Security Vulnerability last week, you will need to update again.
37
+
If you already updated for the previous vulnerabilities, you will need to update again.
36
38
37
-
If you updated to 19.0.2, 19.1.3, and 19.2.2, [these are incomplete](#additional-fix-published) and you will need to update again.
39
+
If you updated to 19.0.3, 19.1.4, and 19.2.3, [these are incomplete](#additional-fix-published), and you will need to update again.
38
40
39
41
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
40
42
43
+
-----
44
+
45
+
_Updated January 26, 2026._
46
+
41
47
</Note>
42
48
43
49
Further details of these vulnerabilities will be provided after the rollout of the fixes are complete.
@@ -46,13 +52,13 @@ Further details of these vulnerabilities will be provided after the rollout of t
46
52
47
53
These vulnerabilities are present in the same packages and versions as [CVE-2025-55182](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components).
48
54
49
-
This includes versions 19.0.0, 19.0.1, 19.0.2, 19.1.0, 19.1.1, 19.1.2, 19.1.2, 19.2.0, 19.2.1and 19.2.2 of:
55
+
This includes 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.2.0, 19.2.1, 19.2.2, and 19.2.3 of:
Fixes were backported to versions 19.0.3, 19.1.4, and 19.2.3. If you are using any of the above packages please upgrade to any of the fixed versions immediately.
61
+
Fixes were backported to versions 19.0.4, 19.1.5, and 19.2.4. If you are using any of the above packages please upgrade to any of the fixed versions immediately.
56
62
57
63
As before, if your app’s React code does not use a server, your app is not affected by these vulnerabilities. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by these vulnerabilities.
58
64
@@ -72,7 +78,7 @@ Additional disclosures can be frustrating, but they are generally a sign of a he
72
78
73
79
Some React frameworks and bundlers depended on, had peer dependencies for, or included the vulnerable React packages. The following React frameworks & bundlers are affected: [next](https://www.npmjs.com/package/next), [react-router](https://www.npmjs.com/package/react-router), [waku](https://www.npmjs.com/package/waku), [@parcel/rsc](https://www.npmjs.com/package/@parcel/rsc), [@vite/rsc-plugin](https://www.npmjs.com/package/@vitejs/plugin-rsc), and [rwsdk](https://www.npmjs.com/package/rwsdk).
74
80
75
-
Please see [the instructions in the previous post](https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
81
+
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
Security researchers have discovered that a malicious HTTP request can be crafted and sent to any Server Functions endpoint that, when deserialized by React, can cause an infinite loop that hangs the server process and consumes CPU. Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
111
+
Security researchers discovered additional DoS vulnerabilities still exist in React Server Components.
103
112
104
-
This creates a vulnerability vector where an attacker may be able to deny users from accessing the product, and potentially have a performance impact on the server environment.
113
+
The vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints, and could lead to server crashes, out-of-memory exceptions or excessive CPU usage; depending on the vulnerable code path being exercised, the application configuration and application code.
105
114
106
-
The patches published today mitigate by preventing the infinite loop.
115
+
The patches published January 26th mitigate these DoS vulnerabilities.
107
116
108
117
<Note>
109
118
110
-
#### Additional fix published {/*additional-fix-published*/}
119
+
#### Additional fixes published {/*additional-fix-published*/}
111
120
112
121
The original fix addressing the DoS in [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) was incomplete.
113
122
114
-
This left versions 19.0.2, 19.1.3, 19.2.2 vulnerable. Versions 19.0.3, 19.1.4, 19.2.3 are safe.
123
+
This left previous versions vulnerable. Versions 19.0.4, 19.1.5, 19.2.4 are safe.
124
+
125
+
-----
115
126
116
-
We've fixed the additional cases and filed [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) for the vulnerable versions.
127
+
_Updated January 26, 2026._
117
128
118
129
</Note>
119
130
131
+
---
132
+
133
+
## High Severity: Denial of Service {/*high-severity-denial-of-service*/}
134
+
135
+
**CVEs:**[CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779)
136
+
**Base Score:** 7.5 (High)
137
+
138
+
Security researchers have discovered that a malicious HTTP request can be crafted and sent to any Server Functions endpoint that, when deserialized by React, can cause an infinite loop that hangs the server process and consumes CPU. Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
139
+
140
+
This creates a vulnerability vector where an attacker may be able to deny users from accessing the product, and potentially have a performance impact on the server environment.
141
+
142
+
The patches published today mitigate by preventing the infinite loop.
143
+
120
144
## Medium Severity: Source Code Exposure {/*low-severity-source-code-exposure*/}
@@ -170,9 +194,9 @@ Always verify against production bundles.
170
194
***December 11th**: Additional DoS reported to [Meta Bug Bounty](https://bugbounty.meta.com/) by Shinsaku Nomura.
171
195
***December 11th**: Patches published and publicly disclosed as [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) and [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184).
172
196
***December 11th**: Missing DoS case found internally, patched and publicly disclosed as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).
173
-
197
+
***January 26th**: Additional DoS cases found, patched, and publicly disclosed as [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864).
174
198
---
175
199
176
200
## Attribution {/*attribution*/}
177
201
178
-
Thank you to [Andrew MacPherson (AndrewMohawk)](https://github.com/AndrewMohawk) for reporting the Source Code Exposure, [RyotaK](https://ryotak.net) from GMO Flatt Security Inc and Shinsaku Nomura of Bitforest Co., Ltd. for reporting the Denial of Service vulnerabilities.
202
+
Thank you to [Andrew MacPherson (AndrewMohawk)](https://github.com/AndrewMohawk) for reporting the Source Code Exposure, [RyotaK](https://ryotak.net) from GMO Flatt Security Inc and Shinsaku Nomura of Bitforest Co., Ltd. for reporting the Denial of Service vulnerabilities. Thank you to [Mufeed VH](https://x.com/mufeedvh) from [Winfunc Research](https://winfunc.com), [Joachim Viide](https://jviide.iki.fi), [RyotaK](https://ryotak.net) from [GMO Flatt Security Inc](https://flatt.tech/en/) and Xiangwei Zhang of Tencent Security YUNDING LAB for reporting the additional DoS vulnerabilities.
0 commit comments