Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/351387?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351387?format=api", "vulnerability_id": "VCID-asd4-96ec-vqav", "summary": "Next.js has a Denial of Service with Server Components\nA vulnerability affects certain React Server Components packages for versions 19.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as [CVE-2026-23869](https://github.com/facebook/react/security/advisories/GHSA-479c-33wc-g2pg). You can read more about this advisory our [this changelog](https://vercel.com/changelog/summary-of-cve-2026-23869).\n\nA specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage. This can result in denial of service in unpatched environments.", "aliases": [ { "alias": "GHSA-q4gf-8mx6-v5v3" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1060926?format=api", "purl": "pkg:npm/next@15.5.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/1060927?format=api", "purl": "pkg:npm/next@16.2.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.2.3" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/67556?format=api", "purl": "pkg:npm/next@13.0.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3szn-4nn4-3fek" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-asd4-96ec-vqav" }, { "vulnerability": "VCID-fwnm-krm1-6kh6" }, { "vulnerability": "VCID-jst7-263v-1ydx" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-rx4e-7jj2-9udg" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-ub68-nqch-bkdm" }, { "vulnerability": "VCID-ukfu-ane3-vfch" }, { "vulnerability": "VCID-vwym-qr5h-fue8" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@13.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/66920?format=api", "purl": "pkg:npm/next@16.0.0-beta.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-asd4-96ec-vqav" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.0-beta.0" } ], "references": [ { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-q4gf-8mx6-v5v3", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-q4gf-8mx6-v5v3" }, { "reference_url": "https://vercel.com/changelog/summary-of-cve-2026-23869", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://vercel.com/changelog/summary-of-cve-2026-23869" }, { "reference_url": "https://github.com/advisories/GHSA-q4gf-8mx6-v5v3", "reference_id": "GHSA-q4gf-8mx6-v5v3", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-q4gf-8mx6-v5v3" } ], "weaknesses": [ { "cwe_id": 770, "name": "Allocation of Resources Without Limits or Throttling", "description": "The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor." } ], "exploits": [], "severity_range_score": "7.0 - 8.9", "exploitability": "0.5", "weighted_severity": "8.0", "risk_score": 4.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-asd4-96ec-vqav" }