CVE-2026-23864

7.5 HIGH

📋 TL;DR

Multiple denial of service vulnerabilities in React Server Components allow attackers to crash servers or cause resource exhaustion by sending specially crafted HTTP requests to Server Function endpoints. This affects applications using react-server-dom-parcel, react-server-dom-turbopack, or react-server-dom-webpack packages. The vulnerabilities can lead to server unavailability and performance degradation.

💻 Affected Systems

Products:
  • react-server-dom-parcel
  • react-server-dom-turbopack
  • react-server-dom-webpack
Versions: All versions before the security patch
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using React Server Components with Server Function endpoints exposed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server crash with out-of-memory exceptions, causing extended service downtime and potential data loss in active sessions.

🟠

Likely Case

Server performance degradation with excessive CPU/memory usage leading to service disruption and degraded user experience.

🟢

If Mitigated

Minimal impact with proper rate limiting, request validation, and monitoring in place to detect and block malicious requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending HTTP requests to vulnerable endpoints, which is straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest versions of affected packages

Vendor Advisory: https://www.facebook.com/security/advisories/cve-2026-23864

Restart Required: Yes

Instructions:

1. Update package.json dependencies to latest versions. 2. Run npm update or yarn upgrade. 3. Restart all affected services. 4. Test application functionality.

🔧 Temporary Workarounds

Rate Limiting Implementation

all

Implement request rate limiting on Server Function endpoints to prevent abuse.

npm install express-rate-limit
npm install helmet

Request Validation Middleware

all

Add input validation middleware to filter malicious payloads before reaching vulnerable code.

npm install express-validator
npm install joi

🧯 If You Can't Patch

  • Implement strict rate limiting and request size limits on all Server Function endpoints.
  • Deploy WAF rules to block suspicious HTTP patterns targeting React Server Components.

🔍 How to Verify

Check if Vulnerable:

Check package.json for affected package versions and verify if Server Function endpoints are exposed.

Check Version:

npm list react-server-dom-parcel react-server-dom-turbopack react-server-dom-webpack

Verify Fix Applied:

Verify package versions are updated to latest releases and test endpoints with normal requests.

📡 Detection & Monitoring

Log Indicators:

  • Spike in HTTP 500 errors
  • Out-of-memory exceptions in logs
  • High CPU usage alerts
  • Abnormal request patterns to /api/* endpoints

Network Indicators:

  • Unusual volume of requests to Server Function endpoints
  • Requests with malformed payloads

SIEM Query:

source="application.logs" AND ("out of memory" OR "CPU spike" OR "500 error") AND endpoint="*server-function*"

🔗 References

📤 Share & Export