Skip to content

Commit 27aac37

Browse files
committed
Update blog post to include recent CVE
1 parent e377252 commit 27aac37

1 file changed

Lines changed: 11 additions & 10 deletions

File tree

src/content/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,20 +2,20 @@
22
title: "Denial of Service and Source Code Exposure in React Server Components"
33
author: The React Team
44
date: 2025/12/11
5-
description: Security researchers have found and disclosed two additional vulnerabilities in React Server Components while attempting to exploit the patches in last week’s critical vulnerability. High vulnerability Denial of Service (CVE-2025-55184), and medium vulnerability Source Code Exposure (CVE-2025-55183)
5+
description: Security researchers have found and disclosed three additional vulnerabilities in React Server Components while attempting to exploit the patches in last week’s critical vulnerability. High vulnerability Denial of Service (CVE-2025-55184), high vulnerability Denial of Service (CVE-2026-23869), and medium vulnerability Source Code Exposure (CVE-2025-55183)
66

77

88
---
99

1010
December 11, 2025 by [The React Team](/community/team)
1111

12-
_Updated January 26, 2026._
12+
_Updated April 8th, 2026._
1313

1414
---
1515

1616
<Intro>
1717

18-
Security researchers have found and disclosed two additional vulnerabilities in React Server Components while attempting to exploit the patches in last week’s critical vulnerability.
18+
Security researchers have found and disclosed three additional vulnerabilities in React Server Components while attempting to exploit the patches in last week’s critical vulnerability.
1919

2020
**These new vulnerabilities do not allow for Remote Code Execution.** The patch for React2Shell remains effective at mitigating the Remote Code Execution exploit.
2121

@@ -36,13 +36,13 @@ We recommend upgrading immediately due to the severity of the newly disclosed vu
3636

3737
If you already updated for the previous vulnerabilities, you will need to update again.
3838

39-
If you updated to 19.0.3, 19.1.4, and 19.2.3, [these are incomplete](#additional-fix-published), and you will need to update again.
39+
If you updated to 19.0.4, 19.1.5, and 19.2.4, [these are incomplete](#additional-fix-published), and you will need to update again.
4040

4141
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
4242

4343
-----
4444

45-
_Updated January 26, 2026._
45+
_Updated April 8th, 2026._
4646

4747
</Note>
4848

@@ -52,7 +52,7 @@ Further details of these vulnerabilities will be provided after the rollout of t
5252

5353
These vulnerabilities are present in the same packages and versions as [CVE-2025-55182](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components).
5454

55-
This includes 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.2.0, 19.2.1, 19.2.2, and 19.2.3 of:
55+
This includes 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.0.4, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.1.5, 19.2.0, 19.2.1, 19.2.2, 19.2.3, and 19.2.4 of:
5656

5757
* [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack)
5858
* [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel)
@@ -118,21 +118,21 @@ The patches published January 26th mitigate these DoS vulnerabilities.
118118

119119
#### Additional fixes published {/*additional-fix-published*/}
120120

121-
The original fix addressing the DoS in [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) was incomplete.
121+
The original fix addressing the DoS in [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) were incomplete.
122122

123-
This left previous versions vulnerable. Versions 19.0.4, 19.1.5, 19.2.4 are safe.
123+
This left previous versions vulnerable. Versions 19.0.5, 19.1.6, 19.2.5 are safe.
124124

125125
-----
126126

127-
_Updated January 26, 2026._
127+
_Updated April 8th, 2026._
128128

129129
</Note>
130130

131131
---
132132

133133
## High Severity: Denial of Service {/*high-severity-denial-of-service*/}
134134

135-
**CVEs:** [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779)
135+
**CVEs:** [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184), [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779), and [CVE-2026-23869](https://www.cve.org/CVERecord?id=CVE-2026-23869)
136136
**Base Score:** 7.5 (High)
137137

138138
Security researchers have discovered that a malicious HTTP request can be crafted and sent to any Server Functions endpoint that, when deserialized by React, can cause an infinite loop that hangs the server process and consumes CPU. Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
@@ -195,6 +195,7 @@ Always verify against production bundles.
195195
* **December 11th**: Patches published and publicly disclosed as [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) and [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184).
196196
* **December 11th**: Missing DoS case found internally, patched and publicly disclosed as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).
197197
* **January 26th**: Additional DoS cases found, patched, and publicly disclosed as [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864).
198+
* **April 8th**: Additional DoS cases found, patched, and publicly disclosed as [CVE-2026-23869](https://www.cve.org/CVERecord?id=CVE-2026-23869).
198199
---
199200

200201
## Attribution {/*attribution*/}

0 commit comments

Comments
 (0)