You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,20 +2,20 @@
2
2
title: "Denial of Service and Source Code Exposure in React Server Components"
3
3
author: The React Team
4
4
date: 2025/12/11
5
-
description: Security researchers have found and disclosed two additional vulnerabilities in React Server Components while attempting to exploit the patches in last week’s critical vulnerability. High vulnerability Denial of Service (CVE-2025-55184), and medium vulnerability Source Code Exposure (CVE-2025-55183)
5
+
description: Security researchers have found and disclosed three additional vulnerabilities in React Server Components while attempting to exploit the patches in last week’s critical vulnerability. High vulnerability Denial of Service (CVE-2025-55184), high vulnerability Denial of Service (CVE-2026-23869), and medium vulnerability Source Code Exposure (CVE-2025-55183)
6
6
7
7
8
8
---
9
9
10
10
December 11, 2025 by [The React Team](/community/team)
11
11
12
-
_Updated January 26, 2026._
12
+
_Updated April 8th, 2026._
13
13
14
14
---
15
15
16
16
<Intro>
17
17
18
-
Security researchers have found and disclosed two additional vulnerabilities in React Server Components while attempting to exploit the patches in last week’s critical vulnerability.
18
+
Security researchers have found and disclosed three additional vulnerabilities in React Server Components while attempting to exploit the patches in last week’s critical vulnerability.
19
19
20
20
**These new vulnerabilities do not allow for Remote Code Execution.** The patch for React2Shell remains effective at mitigating the Remote Code Execution exploit.
21
21
@@ -36,13 +36,13 @@ We recommend upgrading immediately due to the severity of the newly disclosed vu
36
36
37
37
If you already updated for the previous vulnerabilities, you will need to update again.
38
38
39
-
If you updated to 19.0.3, 19.1.4, and 19.2.3, [these are incomplete](#additional-fix-published), and you will need to update again.
39
+
If you updated to 19.0.4, 19.1.5, and 19.2.4, [these are incomplete](#additional-fix-published), and you will need to update again.
40
40
41
41
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
42
42
43
43
-----
44
44
45
-
_Updated January 26, 2026._
45
+
_Updated April 8th, 2026._
46
46
47
47
</Note>
48
48
@@ -52,7 +52,7 @@ Further details of these vulnerabilities will be provided after the rollout of t
52
52
53
53
These vulnerabilities are present in the same packages and versions as [CVE-2025-55182](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components).
54
54
55
-
This includes 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.2.0, 19.2.1, 19.2.2, and 19.2.3 of:
55
+
This includes 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.0.4, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.1.5, 19.2.0, 19.2.1, 19.2.2, 19.2.3, and 19.2.4 of:
@@ -118,21 +118,21 @@ The patches published January 26th mitigate these DoS vulnerabilities.
118
118
119
119
#### Additional fixes published {/*additional-fix-published*/}
120
120
121
-
The original fix addressing the DoS in [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184)was incomplete.
121
+
The original fix addressing the DoS in [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184)and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) were incomplete.
122
122
123
-
This left previous versions vulnerable. Versions 19.0.4, 19.1.5, 19.2.4 are safe.
123
+
This left previous versions vulnerable. Versions 19.0.5, 19.1.6, 19.2.5 are safe.
124
124
125
125
-----
126
126
127
-
_Updated January 26, 2026._
127
+
_Updated April 8th, 2026._
128
128
129
129
</Note>
130
130
131
131
---
132
132
133
133
## High Severity: Denial of Service {/*high-severity-denial-of-service*/}
134
134
135
-
**CVEs:**[CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779)
135
+
**CVEs:**[CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184), [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779), and [CVE-2026-23869](https://www.cve.org/CVERecord?id=CVE-2026-23869)
136
136
**Base Score:** 7.5 (High)
137
137
138
138
Security researchers have discovered that a malicious HTTP request can be crafted and sent to any Server Functions endpoint that, when deserialized by React, can cause an infinite loop that hangs the server process and consumes CPU. Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
@@ -195,6 +195,7 @@ Always verify against production bundles.
195
195
***December 11th**: Patches published and publicly disclosed as [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) and [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184).
196
196
***December 11th**: Missing DoS case found internally, patched and publicly disclosed as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).
197
197
***January 26th**: Additional DoS cases found, patched, and publicly disclosed as [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864).
198
+
***April 8th**: Additional DoS cases found, patched, and publicly disclosed as [CVE-2026-23869](https://www.cve.org/CVERecord?id=CVE-2026-23869).
0 commit comments