Skip to content

Commit ed87618

Browse files
authored
Update DoS blog post with additional CVE (#8263)
1 parent a1ddcf5 commit ed87618

File tree

2 files changed

+55
-26
lines changed

2 files changed

+55
-26
lines changed

src/content/blog/2025/12/03/critical-security-vulnerability-in-react-server-components.md

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -62,13 +62,15 @@ An unauthenticated attacker could craft a malicious HTTP request to any Server F
6262

6363
These instructions have been updated to include the new vulnerabilities:
6464

65-
- **Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) (CVSS 7.5)
65+
- **Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) (CVSS 7.5)
6666
- **Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
67-
68-
They also include the additional case found, patched, and disclosed as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).
67+
- **Denial of Service - High Severity**: January 26, 2026 [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864) (CVSS 7.5)
6968

7069
See the [follow-up blog post](/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components) for more info.
7170

71+
-----
72+
73+
_Updated January 26, 2026._
7274
</Note>
7375

7476
### Next.js {/*update-next-js*/}
@@ -77,18 +79,21 @@ All users should upgrade to the latest patched version in their release line:
7779

7880
```bash
7981
npm install next@14.2.35 // for 13.3.x, 13.4.x, 13.5.x, 14.x
80-
npm install next@15.0.7 // for 15.0.x
81-
npm install next@15.1.11 // for 15.1.x
82-
npm install next@15.2.8 // for 15.2.x
83-
npm install next@15.3.8 // for 15.3.x
84-
npm install next@15.4.10 // for 15.4.x
85-
npm install next@15.5.9 // for 15.5.x
86-
npm install next@16.0.10 // for 16.0.x
82+
npm install next@15.0.8 // for 15.0.x
83+
npm install next@15.1.12 // for 15.1.x
84+
npm install next@15.2.9 // for 15.2.x
85+
npm install next@15.3.9 // for 15.3.x
86+
npm install next@15.4.11 // for 15.4.x
87+
npm install next@15.5.10 // for 15.5.x
88+
npm install next@16.0.11 // for 16.0.x
89+
npm install next@16.1.5 // for 16.1.x
8790

8891
npm install next@15.6.0-canary.60 // for 15.x canary releases
8992
npm install next@16.1.0-canary.19 // for 16.x canary releases
9093
```
9194

95+
15.0.8, 15.1.12, 15.2.9, 15.3.9, 15.4.10, 15.5.10, 15.6.0-canary.61, 16.0.11, 16.1.5
96+
9297
If you are on version `13.3` or later version of Next.js 13 (`13.3.x`, `13.4.x`, or `13.5.x`) please upgrade to version `14.2.35`.
9398

9499
If you are on `next@14.3.0-canary.77` or a later canary release, downgrade to the latest stable 14.x release:

src/content/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components.md

Lines changed: 40 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ description: Security researchers have found and disclosed two additional vulner
99

1010
December 11, 2025 by [The React Team](/community/team)
1111

12+
_Updated January 26, 2026._
13+
1214
---
1315

1416
<Intro>
@@ -23,7 +25,7 @@ Security researchers have found and disclosed two additional vulnerabilities in
2325

2426
The new vulnerabilities are disclosed as:
2527

26-
- **Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) (CVSS 7.5)
28+
- **Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184), [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779), and [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864) (CVSS 7.5)
2729
- **Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
2830

2931
We recommend upgrading immediately due to the severity of the newly disclosed vulnerabilities.
@@ -32,12 +34,16 @@ We recommend upgrading immediately due to the severity of the newly disclosed vu
3234

3335
#### The patches published earlier are vulnerable. {/*the-patches-published-earlier-are-vulnerable*/}
3436

35-
If you already updated for the Critical Security Vulnerability last week, you will need to update again.
37+
If you already updated for the previous vulnerabilities, you will need to update again.
3638

37-
If you updated to 19.0.2, 19.1.3, and 19.2.2, [these are incomplete](#additional-fix-published) and you will need to update again.
39+
If you updated to 19.0.3, 19.1.4, and 19.2.3, [these are incomplete](#additional-fix-published), and you will need to update again.
3840

3941
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
4042

43+
-----
44+
45+
_Updated January 26, 2026._
46+
4147
</Note>
4248

4349
Further details of these vulnerabilities will be provided after the rollout of the fixes are complete.
@@ -46,13 +52,13 @@ Further details of these vulnerabilities will be provided after the rollout of t
4652

4753
These vulnerabilities are present in the same packages and versions as [CVE-2025-55182](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components).
4854

49-
This includes versions 19.0.0, 19.0.1, 19.0.2, 19.1.0, 19.1.1, 19.1.2, 19.1.2, 19.2.0, 19.2.1 and 19.2.2 of:
55+
This includes 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.2.0, 19.2.1, 19.2.2, and 19.2.3 of:
5056

5157
* [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack)
5258
* [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel)
5359
* [react-server-dom-turbopack](https://www.npmjs.com/package/react-server-dom-turbopack?activeTab=readme)
5460

55-
Fixes were backported to versions 19.0.3, 19.1.4, and 19.2.3. If you are using any of the above packages please upgrade to any of the fixed versions immediately.
61+
Fixes were backported to versions 19.0.4, 19.1.5, and 19.2.4. If you are using any of the above packages please upgrade to any of the fixed versions immediately.
5662

5763
As before, if your app’s React code does not use a server, your app is not affected by these vulnerabilities. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by these vulnerabilities.
5864

@@ -72,7 +78,7 @@ Additional disclosures can be frustrating, but they are generally a sign of a he
7278

7379
Some React frameworks and bundlers depended on, had peer dependencies for, or included the vulnerable React packages. The following React frameworks & bundlers are affected: [next](https://www.npmjs.com/package/next), [react-router](https://www.npmjs.com/package/react-router), [waku](https://www.npmjs.com/package/waku), [@parcel/rsc](https://www.npmjs.com/package/@parcel/rsc), [@vite/rsc-plugin](https://www.npmjs.com/package/@vitejs/plugin-rsc), and [rwsdk](https://www.npmjs.com/package/rwsdk).
7480

75-
Please see [the instructions in the previous post](https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
81+
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
7682

7783
### Hosting Provider Mitigations {/*hosting-provider-mitigations*/}
7884

@@ -94,29 +100,47 @@ This is required to mitigate the security advisories, but you do not need to upd
94100

95101
See [this issue](https://github.com/facebook/react-native/issues/54772#issuecomment-3617929832) for more information.
96102

97-
## High Severity: Denial of Service {/*high-severity-denial-of-service*/}
103+
---
98104

99-
**CVEs:** [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779)
105+
## High Severity: Multiple Denial of Service {/*high-severity-multiple-denial-of-service*/}
106+
107+
**CVEs:** [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864)
100108
**Base Score:** 7.5 (High)
109+
**Date**: January 26, 2025
101110

102-
Security researchers have discovered that a malicious HTTP request can be crafted and sent to any Server Functions endpoint that, when deserialized by React, can cause an infinite loop that hangs the server process and consumes CPU. Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
111+
Security researchers discovered additional DoS vulnerabilities still exist in React Server Components.
103112

104-
This creates a vulnerability vector where an attacker may be able to deny users from accessing the product, and potentially have a performance impact on the server environment.
113+
The vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints, and could lead to server crashes, out-of-memory exceptions or excessive CPU usage; depending on the vulnerable code path being exercised, the application configuration and application code.
105114

106-
The patches published today mitigate by preventing the infinite loop.
115+
The patches published January 26th mitigate these DoS vulnerabilities.
107116

108117
<Note>
109118

110-
#### Additional fix published {/*additional-fix-published*/}
119+
#### Additional fixes published {/*additional-fix-published*/}
111120

112121
The original fix addressing the DoS in [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) was incomplete.
113122

114-
This left versions 19.0.2, 19.1.3, 19.2.2 vulnerable. Versions 19.0.3, 19.1.4, 19.2.3 are safe.
123+
This left previous versions vulnerable. Versions 19.0.4, 19.1.5, 19.2.4 are safe.
124+
125+
-----
115126

116-
We've fixed the additional cases and filed [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) for the vulnerable versions.
127+
_Updated January 26, 2026._
117128

118129
</Note>
119130

131+
---
132+
133+
## High Severity: Denial of Service {/*high-severity-denial-of-service*/}
134+
135+
**CVEs:** [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779)
136+
**Base Score:** 7.5 (High)
137+
138+
Security researchers have discovered that a malicious HTTP request can be crafted and sent to any Server Functions endpoint that, when deserialized by React, can cause an infinite loop that hangs the server process and consumes CPU. Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
139+
140+
This creates a vulnerability vector where an attacker may be able to deny users from accessing the product, and potentially have a performance impact on the server environment.
141+
142+
The patches published today mitigate by preventing the infinite loop.
143+
120144
## Medium Severity: Source Code Exposure {/*low-severity-source-code-exposure*/}
121145

122146
**CVE:** [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183)
@@ -170,9 +194,9 @@ Always verify against production bundles.
170194
* **December 11th**: Additional DoS reported to [Meta Bug Bounty](https://bugbounty.meta.com/) by Shinsaku Nomura.
171195
* **December 11th**: Patches published and publicly disclosed as [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) and [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184).
172196
* **December 11th**: Missing DoS case found internally, patched and publicly disclosed as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).
173-
197+
* **January 26th**: Additional DoS cases found, patched, and publicly disclosed as [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864).
174198
---
175199

176200
## Attribution {/*attribution*/}
177201

178-
Thank you to [Andrew MacPherson (AndrewMohawk)](https://github.com/AndrewMohawk) for reporting the Source Code Exposure, [RyotaK](https://ryotak.net) from GMO Flatt Security Inc and Shinsaku Nomura of Bitforest Co., Ltd. for reporting the Denial of Service vulnerabilities.
202+
Thank you to [Andrew MacPherson (AndrewMohawk)](https://github.com/AndrewMohawk) for reporting the Source Code Exposure, [RyotaK](https://ryotak.net) from GMO Flatt Security Inc and Shinsaku Nomura of Bitforest Co., Ltd. for reporting the Denial of Service vulnerabilities. Thank you to [Mufeed VH](https://x.com/mufeedvh) from [Winfunc Research](https://winfunc.com), [Joachim Viide](https://jviide.iki.fi), [RyotaK](https://ryotak.net) from [GMO Flatt Security Inc](https://flatt.tech/en/) and Xiangwei Zhang of Tencent Security YUNDING LAB for reporting the additional DoS vulnerabilities.

0 commit comments

Comments
 (0)