Impact
A vulnerability in React Server Components allows attackers to trigger excessive CPU consumption by sending crafted HTTP requests to Server Function endpoints. The request payload forces the server to perform intensive processing for up to a minute before raising a catchable error, which can render the application unresponsive. This resource exhaustion leads to a denial of service for users of the affected application.
Affected Systems
The vulnerability affects Meta's React Server Components packages: react-server-dom-parcel versions 19.0.0 through 19.0.4, react-server-dom-turbopack versions 19.1.0 through 19.1.5, and react-server-dom-webpack versions 19.2.0 through 19.2.4.
Risk and Exploitability
The CVSS score of 7.5 rates this vulnerability as high severity. However, the EPSS score is below 1 % and the issue is not listed in the CISA KEV catalog, suggesting a low probability of widespread exploitation. The attack vector is network‑based; an attacker can send the crafted request over HTTP directly to the server function endpoint, causing the target server to consume excessive CPU resources. Because the error thrown is catchable, the application may recover, but the temporary denial of service can impact user experience and system stability.
OpenCVE Enrichment
Github GHSA