{"url":"http://public2.vulnerablecode.io/api/packages/66956?format=json","purl":"pkg:npm/react-server-dom-parcel@19.2.3","type":"npm","namespace":"","name":"react-server-dom-parcel","version":"19.2.3","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"19.2.4","latest_non_vulnerable_version":"19.3.0-canary-06fcc8f3-20251009","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/20616?format=json","vulnerability_id":"VCID-bwdv-fw3h-dfce","summary":"React Server Components have multiple Denial of Service Vulnerabilities\n## Impact\n\nIt was found that the fixes to address DoS in React Server Components were incomplete and we found multiple denial of service vulnerabilities still exist in React Server Components.\n\nWe recommend updating immediately.\n\nThe vulnerability exists in versions 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.1.4, 19.2.0, 19.2.1, 19.2.2, 19.2.3 of:\n\n- [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack)  \n- [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel)  \n- [react-server-dom-turbopack](https://www.npmjs.com/package/react-server-dom-turbopack?activeTab=readme)\n\nThe vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints, and could lead to server crashes, out-of-memory exceptions or excessive CPU usage; depending on the vulnerable code path being exercised, the application configuration and application code.\n\n## Patches\n\nFixes were back ported to versions 19.0.4, 19.1.5, and 19.2.4.\n\nIf you are using any of the above packages please upgrade to any of the fixed versions immediately.\n\nIf your app’s React code does not use a server, your app is not affected by this vulnerability. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by this vulnerability.\n\n## References\n\nSee the [blog post](https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components) for more information and upgrade instructions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23864.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23864","reference_id":"","reference_type":"","scores":[{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80341","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80887","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80858","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80856","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80854","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.8079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80787","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80823","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.8084","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23864"},{"reference_url":"https://github.com/facebook/react","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/facebook/react"},{"reference_url":"https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23864","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23864"},{"reference_url":"https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components"},{"reference_url":"https://www.facebook.com/security/advisories/cve-2026-23864","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:26:03Z/"}],"url":"https://www.facebook.com/security/advisories/cve-2026-23864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2433059","reference_id":"2433059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2433059"},{"reference_url":"https://github.com/advisories/GHSA-83fc-fqcc-2hmg","reference_id":"GHSA-83fc-fqcc-2hmg","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-83fc-fqcc-2hmg"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/62262?format=json","purl":"pkg:npm/react-server-dom-parcel@19.2.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-parcel@19.2.4"}],"aliases":["CVE-2026-23864","GHSA-83fc-fqcc-2hmg"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bwdv-fw3h-dfce"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/23910?format=json","vulnerability_id":"VCID-pbfy-s6g4-w7ex","summary":"Denial of Service Vulnerability in React Server Components\nIt was found that the fix to address [CVE-2025-55184](https://github.com/facebook/react/security/advisories/GHSA-2m3v-v2m8-q956) in React Server Components was incomplete and does not prevent a denial of service attack in a specific case.\n\nWe recommend updating immediately.\n\nThe vulnerability exists in versions 19.0.2, 19.1.3, and 19.2.2 of:\n\n- [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack)\n- [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel)\n- [react-server-dom-turbopack](https://www.npmjs.com/package/react-server-dom-turbopack?activeTab=readme)\n\nThese issues are present in the patches published on December 11th, 2025.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-67779.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-67779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-67779","reference_id":"","reference_type":"","scores":[{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37907","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37864","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37849","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37836","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37786","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59372","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59355","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59354","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59371","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59374","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59393","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-67779"},{"reference_url":"https://github.com/facebook/react","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/facebook/react"},{"reference_url":"https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-12T18:39:24Z/"}],"url":"https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2421678","reference_id":"2421678","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2421678"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-67779","reference_id":"CVE-2025-67779","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-67779"},{"reference_url":"https://github.com/facebook/react/security/advisories/GHSA-2m3v-v2m8-q956","reference_id":"GHSA-2m3v-v2m8-q956","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/facebook/react/security/advisories/GHSA-2m3v-v2m8-q956"},{"reference_url":"https://github.com/advisories/GHSA-7gmr-mq3h-m5h9","reference_id":"GHSA-7gmr-mq3h-m5h9","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-7gmr-mq3h-m5h9"},{"reference_url":"https://github.com/facebook/react/security/advisories/GHSA-7gmr-mq3h-m5h9","reference_id":"GHSA-7gmr-mq3h-m5h9","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/facebook/react/security/advisories/GHSA-7gmr-mq3h-m5h9"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/66954?format=json","purl":"pkg:npm/react-server-dom-parcel@19.0.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-parcel@19.0.3"},{"url":"http://public2.vulnerablecode.io/api/packages/66955?format=json","purl":"pkg:npm/react-server-dom-parcel@19.1.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bwdv-fw3h-dfce"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-parcel@19.1.4"},{"url":"http://public2.vulnerablecode.io/api/packages/66956?format=json","purl":"pkg:npm/react-server-dom-parcel@19.2.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bwdv-fw3h-dfce"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-parcel@19.2.3"}],"aliases":["CVE-2025-67779","GHSA-7gmr-mq3h-m5h9"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pbfy-s6g4-w7ex"}],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/react-server-dom-parcel@19.2.3"}