CVE-2026-23864: (CWE-502): Deserialization of Untrusted Data. (CWE-400): Uncontrolled Resource Consumption in Meta react-server-dom-webpack
Multiple denial of service vulnerabilities exist in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack. The vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints, and could lead to server crashes, out-of-memory exceptions or excessive CPU usage; depending on the vulnerable code path being exercised, the application configuration and application code. Strongly consider upgrading to the latest package versions to reduce risk and prevent availability issues in applications using React Server Components.
AI Analysis
Technical Summary
CVE-2026-23864 identifies multiple denial of service (DoS) vulnerabilities in Meta's React Server Components ecosystem, specifically impacting the packages react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack versions 19.0.0 through 19.2.0. The root causes are deserialization of untrusted data (CWE-502) and uncontrolled resource consumption (CWE-400). These vulnerabilities are exploitable by sending specially crafted HTTP requests to Server Function endpoints, which are part of React Server Components' architecture allowing server-side execution of component logic. When these malicious requests are processed, they can trigger server crashes, out-of-memory exceptions, or excessive CPU consumption depending on the code path exercised and the specific application configuration. This results in denial of service conditions, severely impacting application availability. The vulnerabilities do not require authentication or user interaction, increasing their risk profile. Although no known exploits have been reported in the wild, the potential impact on server stability is significant. The lack of a CVSS score necessitates a severity assessment based on impact and exploitability. The recommended mitigation is to upgrade to the latest package versions where these issues are addressed. Additionally, developers should audit server function endpoints to limit exposure, implement strict input validation, and monitor resource usage to detect anomalous activity. These vulnerabilities highlight the risks of deserializing untrusted data and the importance of resource management in server-side JavaScript frameworks.
Potential Impact
For European organizations, the primary impact is on the availability of web applications using affected React Server Components versions. Denial of service conditions can lead to server crashes or resource exhaustion, causing downtime and degraded user experience. This can affect e-commerce platforms, SaaS providers, and internal business applications relying on React Server Components for server-side rendering or server function execution. The disruption may result in financial losses, reputational damage, and operational challenges. Organizations with high traffic volumes or critical web services are especially vulnerable, as resource exhaustion can cascade and affect other services. Additionally, the exploitation does not require authentication, increasing the attack surface and risk of automated attacks. The vulnerabilities may also complicate incident response and recovery due to unpredictable server behavior under attack. European data protection regulations emphasize service availability, so prolonged outages could also have compliance implications. Overall, the threat poses a significant risk to service continuity and operational resilience in European digital environments.
Mitigation Recommendations
1. Upgrade all affected React Server Components packages (react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack) to the latest versions where these vulnerabilities are fixed. 2. Audit and restrict access to Server Function endpoints to minimize exposure to untrusted inputs, using network controls or authentication where feasible. 3. Implement strict input validation and sanitization on all data deserialized by server functions to prevent malicious payloads. 4. Monitor server resource usage (CPU, memory) closely to detect abnormal spikes indicative of exploitation attempts. 5. Employ rate limiting and anomaly detection on HTTP requests targeting server function endpoints to mitigate automated or volumetric attacks. 6. Conduct regular security reviews and penetration testing focused on server-side components and deserialization logic. 7. Educate development teams about secure deserialization practices and resource management in React Server Components. 8. Prepare incident response plans to quickly isolate and recover from denial of service events related to these vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2026-23864: (CWE-502): Deserialization of Untrusted Data. (CWE-400): Uncontrolled Resource Consumption in Meta react-server-dom-webpack
Description
Multiple denial of service vulnerabilities exist in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack. The vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints, and could lead to server crashes, out-of-memory exceptions or excessive CPU usage; depending on the vulnerable code path being exercised, the application configuration and application code. Strongly consider upgrading to the latest package versions to reduce risk and prevent availability issues in applications using React Server Components.
AI-Powered Analysis
Technical Analysis
CVE-2026-23864 identifies multiple denial of service (DoS) vulnerabilities in Meta's React Server Components ecosystem, specifically impacting the packages react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack versions 19.0.0 through 19.2.0. The root causes are deserialization of untrusted data (CWE-502) and uncontrolled resource consumption (CWE-400). These vulnerabilities are exploitable by sending specially crafted HTTP requests to Server Function endpoints, which are part of React Server Components' architecture allowing server-side execution of component logic. When these malicious requests are processed, they can trigger server crashes, out-of-memory exceptions, or excessive CPU consumption depending on the code path exercised and the specific application configuration. This results in denial of service conditions, severely impacting application availability. The vulnerabilities do not require authentication or user interaction, increasing their risk profile. Although no known exploits have been reported in the wild, the potential impact on server stability is significant. The lack of a CVSS score necessitates a severity assessment based on impact and exploitability. The recommended mitigation is to upgrade to the latest package versions where these issues are addressed. Additionally, developers should audit server function endpoints to limit exposure, implement strict input validation, and monitor resource usage to detect anomalous activity. These vulnerabilities highlight the risks of deserializing untrusted data and the importance of resource management in server-side JavaScript frameworks.
Potential Impact
For European organizations, the primary impact is on the availability of web applications using affected React Server Components versions. Denial of service conditions can lead to server crashes or resource exhaustion, causing downtime and degraded user experience. This can affect e-commerce platforms, SaaS providers, and internal business applications relying on React Server Components for server-side rendering or server function execution. The disruption may result in financial losses, reputational damage, and operational challenges. Organizations with high traffic volumes or critical web services are especially vulnerable, as resource exhaustion can cascade and affect other services. Additionally, the exploitation does not require authentication, increasing the attack surface and risk of automated attacks. The vulnerabilities may also complicate incident response and recovery due to unpredictable server behavior under attack. European data protection regulations emphasize service availability, so prolonged outages could also have compliance implications. Overall, the threat poses a significant risk to service continuity and operational resilience in European digital environments.
Mitigation Recommendations
1. Upgrade all affected React Server Components packages (react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack) to the latest versions where these vulnerabilities are fixed. 2. Audit and restrict access to Server Function endpoints to minimize exposure to untrusted inputs, using network controls or authentication where feasible. 3. Implement strict input validation and sanitization on all data deserialized by server functions to prevent malicious payloads. 4. Monitor server resource usage (CPU, memory) closely to detect abnormal spikes indicative of exploitation attempts. 5. Employ rate limiting and anomaly detection on HTTP requests targeting server function endpoints to mitigate automated or volumetric attacks. 6. Conduct regular security reviews and penetration testing focused on server-side components and deserialization logic. 7. Educate development teams about secure deserialization practices and resource management in React Server Components. 8. Prepare incident response plans to quickly isolate and recover from denial of service events related to these vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Meta
- Date Reserved
- 2026-01-16T19:49:26.309Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6977c21c4623b1157cb61420
Added to database: 1/26/2026, 7:35:56 PM
Last enriched: 1/26/2026, 7:50:14 PM
Last updated: 1/26/2026, 9:31:19 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1443: SQL Injection in code-projects Online Music Site
MediumCVE-2025-9820: Stack-based Buffer Overflow in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2025-9615: Improper Preservation of Permissions in Red Hat Red Hat Enterprise Linux 10
LowCVE-2026-1190: Missing XML Validation in Red Hat Red Hat Build of Keycloak
LowCVE-2026-0810: Incorrect Calculation of Multi-Byte String Length in GitoxideLabs gitoxide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.