CVE-2026-23869
Description
A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4). The vulnerability is triggered by sending specially crafted HTTP requests to Server Function endpoints.The payload of the HTTP request causes excessive CPU usage for up to a minute ending in a thrown error that is catchable.
CWE
- CWE-502 — CWE-502 Deserialization of Untrusted Data
- CWE-400 — CWE-400 Uncontrolled Resource Consumption
Affected
- Meta / react-server-dom-turbopack — v=19.0.0 ≤19.0.4 [affected]; v=19.1.0 ≤19.1.5 [affected]; v=19.2.0 ≤19.2.4 [affected]
- Meta / react-server-dom-parcel — v=19.0.0 ≤19.0.4 [affected]; v=19.1.0 ≤19.1.5 [affected]; v=19.2.0 ≤19.2.4 [affected]
- Meta / react-server-dom-webpack — v=19.0.0 ≤19.0.4 [affected]; v=19.1.0 ≤19.1.5 [affected]; v=19.2.0 ≤19.2.4 [affected]
CVSS
- 3.1 score=7.5 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
- https://github.com/facebook/react/security/advisories/GHSA-479c-33wc-g2pg x_refsource_CONFIRM
Source
cvelistV5-main/cves/2026/23xxx/CVE-2026-23869.json