Description
A denial of service vulnerability could be triggered by sending specially crafted HTTP requests to server function endpoints, this could lead to server crashes, out-of-memory exceptions or excessive CPU usage; affecting the following packages: react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack (versions 19.0.0 through 19.0.5, 19.1.0 through 19.1.6, and 19.2.0 through 19.2.5).
Published: 2026-05-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A denial of service vulnerability allows an attacker to trigger server crashes, out‑of‑memory exceptions, or excessive CPU usage by sending specially crafted HTTP requests to server function endpoints. The impact is a loss of availability for the affected application.

Affected Systems

The vulnerability affects Meta’s React Server DOM packages: react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack. The affected versions are 19.0.0 through 19.0.5, 19.1.0 through 19.1.6, and 19.2.0 through 19.2.5.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity denial of service. The EPSS score is not available and the issue is not listed in CISA’s KEV catalog, but the vulnerability can be exploited remotely without authentication by sending crafted HTTP requests to exposed server function endpoints. The lack of mitigation measures in the affected releases means a successful attack would result in resource exhaustion and service interruption.

Generated by OpenCVE AI on May 6, 2026 at 17:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Meta react‑server‑dom packages to the latest non‑vulnerable version (>=19.2.6 or later).
  • Apply network‑level rate limiting or request filtering on the HTTP endpoints that expose the React Server Function APIs to reduce the risk of resource exhaustion.
  • Audit and refactor application code to minimize reliance on these packages or replace them with alternative solutions if an upgrade cannot be applied immediately.

Generated by OpenCVE AI on May 6, 2026 at 17:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Denial of Service via Crafted HTTP Requests in Meta React Server DOM Packages
Weaknesses CWE-770

Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A denial of service vulnerability could be triggered by sending specially crafted HTTP requests to server function endpoints, this could lead to server crashes, out-of-memory exceptions or excessive CPU usage; affecting the following packages: react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack (versions 19.0.0 through 19.0.5, 19.1.0 through 19.1.6, and 19.2.0 through 19.2.5).
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Meta

Published:

Updated: 2026-05-06T19:06:00.435Z

Reserved: 2026-01-16T19:49:26.309Z

Link: CVE-2026-23870

cve-icon Vulnrichment

Updated: 2026-05-06T19:05:53.869Z

cve-icon NVD

Status : Received

Published: 2026-05-06T17:16:22.043

Modified: 2026-05-06T17:16:22.043

Link: CVE-2026-23870

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:30:08Z

Weaknesses