{"url":"http://public2.vulnerablecode.io/api/packages/62259?format=json","purl":"pkg:npm/react-server-dom-webpack@19.2.4","type":"npm","namespace":"","name":"react-server-dom-webpack","version":"19.2.4","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"19.2.5","latest_non_vulnerable_version":"19.3.0-canary-06fcc8f3-20251009","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/350876?format=json","vulnerability_id":"VCID-fa57-smff-sbg2","summary":"A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4). The vulnerability is triggered by sending specially crafted HTTP requests to Server Function endpoints.The payload of the HTTP request causes excessive CPU usage for up to a minute ending in a thrown error that is catchable.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23869.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23869","reference_id":"","reference_type":"","scores":[{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55238","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5522","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.7176","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71772","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72732","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72702","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72713","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72709","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72704","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72757","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74896","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74842","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23869"},{"reference_url":"https://github.com/facebook/react","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/facebook/react"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23869","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23869"},{"reference_url":"https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2456663","reference_id":"2456663","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2456663"},{"reference_url":"https://github.com/advisories/GHSA-479c-33wc-g2pg","reference_id":"GHSA-479c-33wc-g2pg","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-479c-33wc-g2pg"},{"reference_url":"https://github.com/facebook/react/security/advisories/GHSA-479c-33wc-g2pg","reference_id":"GHSA-479c-33wc-g2pg","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-08T19:55:33Z/"}],"url":"https://github.com/facebook/react/security/advisories/GHSA-479c-33wc-g2pg"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1060883?format=json","purl":"pkg:npm/react-server-dom-webpack@19.2.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-webpack@19.2.5"}],"aliases":["CVE-2026-23869","GHSA-479c-33wc-g2pg"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fa57-smff-sbg2"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/20616?format=json","vulnerability_id":"VCID-bwdv-fw3h-dfce","summary":"React Server Components have multiple Denial of Service Vulnerabilities\n## Impact\n\nIt was found that the fixes to address DoS in React Server Components were incomplete and we found multiple denial of service vulnerabilities still exist in React Server Components.\n\nWe recommend updating immediately.\n\nThe vulnerability exists in versions 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.1.4, 19.2.0, 19.2.1, 19.2.2, 19.2.3 of:\n\n- [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack)  \n- [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel)  \n- [react-server-dom-turbopack](https://www.npmjs.com/package/react-server-dom-turbopack?activeTab=readme)\n\nThe vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints, and could lead to server crashes, out-of-memory exceptions or excessive CPU usage; depending on the vulnerable code path being exercised, the application configuration and application code.\n\n## Patches\n\nFixes were back ported to versions 19.0.4, 19.1.5, and 19.2.4.\n\nIf you are using any of the above packages please upgrade to any of the fixed versions immediately.\n\nIf your app’s React code does not use a server, your app is not affected by this vulnerability. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by this vulnerability.\n\n## References\n\nSee the [blog post](https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components) for more information and upgrade instructions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23864.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23864","reference_id":"","reference_type":"","scores":[{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78264","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78245","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78253","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80341","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80858","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80856","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80854","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.8079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80787","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80823","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.8084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80935","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80914","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80887","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01924","scoring_system":"epss","scoring_elements":"0.83553","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23864"},{"reference_url":"https://github.com/facebook/react","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/facebook/react"},{"reference_url":"https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23864","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23864"},{"reference_url":"https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components"},{"reference_url":"https://www.facebook.com/security/advisories/cve-2026-23864","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:26:03Z/"}],"url":"https://www.facebook.com/security/advisories/cve-2026-23864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2433059","reference_id":"2433059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2433059"},{"reference_url":"https://github.com/advisories/GHSA-83fc-fqcc-2hmg","reference_id":"GHSA-83fc-fqcc-2hmg","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-83fc-fqcc-2hmg"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13571","reference_id":"RHSA-2026:13571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13571"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/62264?format=json","purl":"pkg:npm/react-server-dom-webpack@19.0.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-fa57-smff-sbg2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-webpack@19.0.4"},{"url":"http://public2.vulnerablecode.io/api/packages/62263?format=json","purl":"pkg:npm/react-server-dom-webpack@19.1.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-fa57-smff-sbg2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-webpack@19.1.5"},{"url":"http://public2.vulnerablecode.io/api/packages/62259?format=json","purl":"pkg:npm/react-server-dom-webpack@19.2.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-fa57-smff-sbg2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-webpack@19.2.4"}],"aliases":["CVE-2026-23864","GHSA-83fc-fqcc-2hmg"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bwdv-fw3h-dfce"}],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-webpack@19.2.4"}