React Server Components: The Flight to Nowhere (CVE-2026-23864)
Vulnerability ID: CVE-2026-23864
CVSS Score: 7.5
Published: 2026-01-29
Multiple Denial of Service (DoS) and Prototype Pollution vulnerabilities exist in the React Server Components (RSC) 'Flight' protocol implementation. These flaws allow attackers to trigger Out-of-Memory (OOM) crashes, excessive CPU consumption, or potentially pollute the object prototype chain via specially crafted RSC stream payloads.
TL;DR
React's 'Flight' protocol failed to validate deserialization limits. Attackers can send malicious streams to Next.js/React servers that allocate massive arrays, process infinite BigInts, or traverse __proto__. This kills the server instantly. Patched in v19.0.4+.
⚠️ Exploit Status: POC
Technical Details
- CWE IDs: CWE-502 (Deserialization), CWE-400 (Resource Exhaustion)
- Attack Vector: Network (HTTP POST)
- CVSS v3.1: 7.5 (High)
- EPSS Score: 0.00603 (68.98%)
- Exploit Status: PoC (Private)
- Protocol: React 'Flight' RPC
Affected Systems
- Next.js Applications (App Router)
- Remix Framework (Future RSC support)
- React Server Components (Custom Implementations)
- react-server-dom-webpack
- react-server-dom-turbopack
- react-server-dom-parcel
-
react-server-dom-webpack: 19.0.0 < 19.0.4 (Fixed in:
19.0.4) -
react-server-dom-webpack: 19.1.0 < 19.1.5 (Fixed in:
19.1.5) -
react-server-dom-webpack: 19.2.0 < 19.2.4 (Fixed in:
19.2.4)
Code Analysis
Commit: 63d61c7
Fix DoS and prototype pollution in server components
const __PROTO__ = '__proto__';
if (key === __PROTO__) { return undefined; }
Exploit Details
- Internal Research: Private Proof of Concept demonstrating OOM via array allocation
Mitigation Strategies
- Update React Server DOM packages
- Implement WAF rules for RSC payloads
- Monitor for OOM crashes
Remediation Steps:
- Identify the package manager (npm, yarn, pnpm) used in the project.
- Run
npm outdatedor equivalent to check current versions ofreactandreact-server-dom-*. - Update to React version 19.0.4, 19.1.5, or 19.2.4 or later using
npm update. - Verify the update by checking
node_modules/react-server-dom-webpack/package.json. - Restart the application server to load the new code.
References
Read the full report for CVE-2026-23864 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)