{"api_version":"1","generated_at":"2026-04-23T09:41:06+00:00","cve":"CVE-2026-23869","urls":{"html":"https://cve.report/CVE-2026-23869","api":"https://cve.report/api/cve/CVE-2026-23869.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-23869","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-23869"},"summary":{"title":"CVE-2026-23869","description":"A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4). The vulnerability is triggered by sending specially crafted HTTP requests to Server Function endpoints.The payload of the HTTP request causes excessive CPU usage for up to a minute ending in a thrown error that is catchable.","state":"PUBLISHED","assigner":"Meta","published_at":"2026-04-08 20:16:23","updated_at":"2026-04-08 21:26:13"},"problem_types":["CWE-400","CWE-502","(CWE-502) Deserialization of Untrusted Data, (CWE-400) Uncontrolled Resource Consumption","CWE-502 CWE-502 Deserialization of Untrusted Data","CWE-400 CWE-400 Uncontrolled Resource Consumption"],"metrics":[{"version":"3.1","source":"cve-assign@fb.com","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/facebook/react/security/advisories/GHSA-479c-33wc-g2pg","name":"https://github.com/facebook/react/security/advisories/GHSA-479c-33wc-g2pg","refsource":"cve-assign@fb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23869","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23869","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Meta","product":"react-server-dom-turbopack","version":"affected 19.0.0 19.0.4 semver","platforms":[]},{"source":"CNA","vendor":"Meta","product":"react-server-dom-turbopack","version":"affected 19.1.0 19.1.5 semver","platforms":[]},{"source":"CNA","vendor":"Meta","product":"react-server-dom-turbopack","version":"affected 19.2.0 19.2.4 semver","platforms":[]},{"source":"CNA","vendor":"Meta","product":"react-server-dom-parcel","version":"affected 19.0.0 19.0.4 semver","platforms":[]},{"source":"CNA","vendor":"Meta","product":"react-server-dom-parcel","version":"affected 19.1.0 19.1.5 semver","platforms":[]},{"source":"CNA","vendor":"Meta","product":"react-server-dom-parcel","version":"affected 19.2.0 19.2.4 semver","platforms":[]},{"source":"CNA","vendor":"Meta","product":"react-server-dom-webpack","version":"affected 19.0.0 19.0.4 semver","platforms":[]},{"source":"CNA","vendor":"Meta","product":"react-server-dom-webpack","version":"affected 19.1.0 19.1.5 semver","platforms":[]},{"source":"CNA","vendor":"Meta","product":"react-server-dom-webpack","version":"affected 19.2.0 19.2.4 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"23869","cve":"CVE-2026-23869","epss":"0.004230000","percentile":"0.621390000","score_date":"2026-04-14","updated_at":"2026-04-15 00:18:08"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-23869","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-08T19:55:33.314236Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-502","description":"CWE-502 Deserialization of Untrusted Data","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-400","description":"CWE-400 Uncontrolled Resource Consumption","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T19:56:22.791Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"react-server-dom-turbopack","vendor":"Meta","versions":[{"lessThanOrEqual":"19.0.4","status":"affected","version":"19.0.0","versionType":"semver"},{"lessThanOrEqual":"19.1.5","status":"affected","version":"19.1.0","versionType":"semver"},{"lessThanOrEqual":"19.2.4","status":"affected","version":"19.2.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"react-server-dom-parcel","vendor":"Meta","versions":[{"lessThanOrEqual":"19.0.4","status":"affected","version":"19.0.0","versionType":"semver"},{"lessThanOrEqual":"19.1.5","status":"affected","version":"19.1.0","versionType":"semver"},{"lessThanOrEqual":"19.2.4","status":"affected","version":"19.2.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"react-server-dom-webpack","vendor":"Meta","versions":[{"lessThanOrEqual":"19.0.4","status":"affected","version":"19.0.0","versionType":"semver"},{"lessThanOrEqual":"19.1.5","status":"affected","version":"19.1.0","versionType":"semver"},{"lessThanOrEqual":"19.2.4","status":"affected","version":"19.2.0","versionType":"semver"}]}],"dateAssigned":"2026-04-08T00:00:00.000Z","descriptions":[{"lang":"en","value":"A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4). The vulnerability is triggered by sending specially crafted HTTP requests to Server Function endpoints.The payload of the HTTP request causes excessive CPU usage for up to a minute ending in a thrown error that is catchable."}],"metrics":[{"cvssV3_1":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"(CWE-502) Deserialization of Untrusted Data, (CWE-400) Uncontrolled Resource Consumption","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T19:11:08.418Z","orgId":"4fc57720-52fe-4431-a0fb-3d2c8747b827","shortName":"Meta"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/facebook/react/security/advisories/GHSA-479c-33wc-g2pg"}]}},"cveMetadata":{"assignerOrgId":"4fc57720-52fe-4431-a0fb-3d2c8747b827","assignerShortName":"Meta","cveId":"CVE-2026-23869","datePublished":"2026-04-08T19:11:08.418Z","dateReserved":"2026-01-16T19:49:26.309Z","dateUpdated":"2026-04-08T19:56:22.791Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-08 20:16:23","lastModifiedDate":"2026-04-08 21:26:13","problem_types":["CWE-400","CWE-502","(CWE-502) Deserialization of Untrusted Data, (CWE-400) Uncontrolled Resource Consumption","CWE-502 CWE-502 Deserialization of Untrusted Data","CWE-400 CWE-400 Uncontrolled Resource Consumption"],"metrics":{"cvssMetricV31":[{"source":"cve-assign@fb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"23869","Ordinal":"1","Title":"CVE-2026-23869","CVE":"CVE-2026-23869","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"23869","Ordinal":"1","NoteData":"A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4). The vulnerability is triggered by sending specially crafted HTTP requests to Server Function endpoints.The payload of the HTTP request causes excessive CPU usage for up to a minute ending in a thrown error that is catchable.","Type":"Description","Title":"CVE-2026-23869"}]}}}