Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google

React Faces Third Wave of Vulnerabilities as Researchers Uncover DoS Flaws in Patched Code

New React DoS vulnerabilities (CVE-2026-23864) found after React2Shell patches, forcing third emergency update in weeks

CVE-2026-23864

React developers are facing yet another emergency patching cycle after security researchers discovered additional denial-of-service vulnerabilities while probing the fixes for last month's catastrophic React2Shell exploit

The new flaws—designated CVE-2026-23864 with a CVSS score of 7.5—mark the third round of critical security disclosures in React Server Components since December, creating what security experts are calling an unprecedented cascade of vulnerabilities in one of the web's most popular frameworks.

The discovery follows a familiar but concerning pattern in vulnerability research. When critical flaws like React2Shell emerge, security researchers immediately begin stress-testing the patches, often uncovering additional attack vectors that the initial fixes missed. 

"This pattern shows up across the industry, not just in JavaScript," the React Team acknowledged in their advisory, comparing the situation to the aftermath of Log4Shell, which triggered similar cascading discoveries.

From Critical RCE to Persistent DoS Problems

The vulnerability chain began in early December when Cyber Kendra and security researcher Lachlan Davidson disclosed React2Shell (CVE-2025-55182)—a maximum-severity remote code execution flaw that allowed unauthenticated attackers to execute arbitrary code on React servers with a single HTTP request. 

That disclosure triggered immediate exploitation by state-sponsored groups, with Amazon and Microsoft reporting active attacks within hours.

Within days, researchers examining React2Shell's patches discovered two additional vulnerabilities: CVE-2025-55184 (denial-of-service) and CVE-2025-55183 (source code exposure). Cyber Kendra reported these findings on December 12, warning that developers who had already patched for React2Shell would need to update again immediately. The React Team published versions 19.0.3, 19.1.4, and 19.2.3 to address these issues.

But those patches proved incomplete. Security researchers Mufeed VH from Winfunc Research, Joachim Viide, RyotaK from GMO Flatt Security, and Xiangwei Zhang of Tencent Security YUNDING LAB discovered additional denial-of-service attack vectors that survived the previous fixes. 

The new CVE-2026-23864 vulnerabilities can cause servers to crash, trigger out-of-memory exceptions, or consume excessive CPU through specially crafted HTTP requests to Server Function endpoints.

Multiple Attack Paths

Unlike React2Shell, these vulnerabilities don't enable remote code execution—but their impact remains severe. An attacker can send malicious HTTP requests that, when deserialized by React, create conditions ranging from infinite loops that hang server processes to memory exhaustion that crashes entire applications. The specific impact depends on which vulnerable code path gets triggered and how the application is configured.

"The vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints," Vercel explained in their advisory, noting they've deployed Web Application Firewall rules across their global infrastructure to protect customers. 

However, both Vercel and the React Team emphasize that WAF protections provide only temporary defense-in-depth—upgrading to patched versions remains the only complete solution.

The vulnerability affects the same React packages that were vulnerable to React2Shell: react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack in versions 19.0.x through 19.2.x. Downstream frameworks, including Next.js (versions 13.x through 16.x), React Router, Waku, Parcel, Vite, and RedwoodSDK, all inherit the vulnerability and require updates.

Immediate Action Required—Again

Organizations running React Server Components must upgrade to the latest patched releases: React versions 19.0.4, 19.1.5, or 19.2.4, and Next.js versions ranging from 15.0.8 through 16.2.0-canary.9, depending on their release branch. The React Team warns that previous "patched" versions—including 19.0.3, 19.1.4, and 19.2.3 from last month—remain vulnerable to the newly disclosed attack vectors.

"If you have already updated for the previous vulnerabilities, you will need to update again," the React Team stated plainly. 

The advisory notes that even applications that don't explicitly implement Server Function endpoints may be vulnerable if they support React Server Components—a configuration enabled by default in many popular frameworks.

Major hosting providers, including Vercel, Cloudflare, Amazon Web Services, and Google Cloud, have deployed temporary mitigations, but all emphasize that these should not replace immediate patching. The response mirrors December's React2Shell crisis, when Chinese state-sponsored groups exploited vulnerable applications within hours of public disclosure.

Three separate disclosure waves in less than two months—starting with a maximum-severity RCE, followed by DoS and code exposure issues, and now additional DoS vectors—suggest the attack surface may be broader than initially understood.

For organizations running React applications, the message remains clear: patch immediately, verify your versions, and prepare for the possibility of additional updates. As the React ecosystem continues to grapple with security challenges in its Server Components implementation, staying current with patches has become a weekly rather than monthly concern.

Post a Comment