{"api_version":"1","generated_at":"2026-05-13T19:30:42+00:00","cve":"CVE-2026-44582","urls":{"html":"https://cve.report/CVE-2026-44582","api":"https://cve.report/api/cve/CVE-2026-44582.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-44582","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-44582"},"summary":{"title":"Next.js: Cache poisoning via collisions in React Server Component cache-busting","description":"Next.js is a React framework for building full-stack web applications. From 13.4.6 to before 15.5.16 and 16.2.5, React Server Component responses can be vulnerable to cache poisoning in deployments that rely on shared caches with insufficient response partitioning. In affected conditions, collisions in the _rsc cache-busting value can allow an attacker to poison cache entries so users receive the wrong response variant for a given URL. This vulnerability is fixed in 15.5.16 and 16.2.5.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-13 18:16:19","updated_at":"2026-05-13 18:17:16"},"problem_types":["CWE-328","CWE-328 CWE-328: Use of Weak Hash"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"3.7","severity":"LOW","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"3.7","severity":"LOW","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","data":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.7,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/vercel/next.js/security/advisories/GHSA-vfv6-92ff-j949","name":"https://github.com/vercel/next.js/security/advisories/GHSA-vfv6-92ff-j949","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-44582","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-44582","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"vercel","product":"next.js","version":"affected >= 13.4.6, < 15.5.16","platforms":[]},{"source":"CNA","vendor":"vercel","product":"next.js","version":"affected >= 16.0.0, < 16.2.5","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"next.js","vendor":"vercel","versions":[{"status":"affected","version":">= 13.4.6, < 15.5.16"},{"status":"affected","version":">= 16.0.0, < 16.2.5"}]}],"descriptions":[{"lang":"en","value":"Next.js is a React framework for building full-stack web applications. From 13.4.6 to before 15.5.16 and 16.2.5, React Server Component responses can be vulnerable to cache poisoning in deployments that rely on shared caches with insufficient response partitioning. In affected conditions, collisions in the _rsc cache-busting value can allow an attacker to poison cache entries so users receive the wrong response variant for a given URL. This vulnerability is fixed in 15.5.16 and 16.2.5."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.7,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-328","description":"CWE-328: Use of Weak Hash","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-13T17:08:22.240Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/vercel/next.js/security/advisories/GHSA-vfv6-92ff-j949","tags":["x_refsource_CONFIRM"],"url":"https://github.com/vercel/next.js/security/advisories/GHSA-vfv6-92ff-j949"}],"source":{"advisory":"GHSA-vfv6-92ff-j949","discovery":"UNKNOWN"},"title":"Next.js: Cache poisoning via collisions in React Server Component cache-busting"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-44582","datePublished":"2026-05-13T17:08:22.240Z","dateReserved":"2026-05-06T21:49:12.425Z","dateUpdated":"2026-05-13T17:08:22.240Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-13 18:16:19","lastModifiedDate":"2026-05-13 18:17:16","problem_types":["CWE-328","CWE-328 CWE-328: Use of Weak Hash"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"44582","Ordinal":"1","Title":"Next.js: Cache poisoning via collisions in React Server Componen","CVE":"CVE-2026-44582","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"44582","Ordinal":"1","NoteData":"Next.js is a React framework for building full-stack web applications. From 13.4.6 to before 15.5.16 and 16.2.5, React Server Component responses can be vulnerable to cache poisoning in deployments that rely on shared caches with insufficient response partitioning. In affected conditions, collisions in the _rsc cache-busting value can allow an attacker to poison cache entries so users receive the wrong response variant for a given URL. This vulnerability is fixed in 15.5.16 and 16.2.5.","Type":"Description","Title":"Next.js: Cache poisoning via collisions in React Server Componen"}]}}}