Critical Vulnerability Discovered in React Server Components Exposes Apps to DoS Attacks
A critical, high-severity vulnerability has been unearthed in React Server Components, creating an immediate and serious risk of Denial of Service (DoS) attacks against modern web applications. Tracked as CVE-2026-23869, this flaw permits unauthenticated remote attackers to exhaust backend server resources by sending specially crafted network requests.
The GitHub Security Advisory has assigned a High severity rating to CVE-2026-23869. The ease of exploitation—requiring low complexity, no user interaction, and no elevated privileges—underscores the urgent threat it poses to production environments leveraging vulnerable React Server Components packages.
Understanding the Attack Mechanism
This vulnerability specifically targets how React Server Components process incoming data at Server Function endpoints. An attacker can exploit this by delivering a maliciously crafted HTTP request directly over the network to these vulnerable endpoints. The server’s receipt of this payload triggers a sequence of two distinct security weaknesses:
- Deserialization of untrusted data (CWE-502): The system attempts to process potentially dangerous input without adequate validation, opening the door for exploitation.
- Uncontrolled resource consumption (CWE-400): As the server grapples with the complex or malformed payload, it enters a state of excessive resource consumption.
This perilous combination forces the server into a prolonged state of high CPU usage, potentially lasting up to an entire minute. While the incident typically concludes with a catchable error rather than a complete system crash, the significant and sustained CPU spike severely degrades application performance and effectively blocks access for legitimate users, constituting a successful DoS attack.
Affected Packages and Scope
The vulnerability is rooted in the core packages responsible for server-side rendering and component routing within the React Server Components ecosystem. Specifically, the flaw impacts the 19.0, 19.1, and 19.2 release branches.
The following npm packages are confirmed to contain the CVE-2026-23869 vulnerability:
react-server-dom-parcel(versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4)react-server-dom-turbopack(versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4)react-server-dom-webpack(versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4)
It is important to note that not all React applications are exposed to this threat. Your project’s specific architecture determines your susceptibility:
- Your application is entirely safe if your React code operates exclusively on the client side without any React Server Components.
- Furthermore, if your application does not utilize a framework, bundler, or plugin that explicitly supports React Server Components, your infrastructure remains unaffected.
Immediate Mitigation and Fixes
The diligent React maintenance team has successfully backported security fixes to comprehensively address this resource exhaustion flaw in React Server Components. Development teams managing projects on GitHub are strongly encouraged to audit their dependencies without delay and upgrade immediately to restore robust security.
To effectively mitigate CVE-2026-23869 and secure your applications, update your affected packages to the following secure versions:
- 19.0.5
- 19.1.6
- 19.2.5
