Description
RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing functions, because browsers send SameSite=Lax cookies on top-level GET requests. This affected all server functions -- both serverAction() handlers and bare exported functions in "use server" files. This vulnerability is fixed in 1.0.6.
Published: 2026-04-07
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted State Change via CSRF
Action: Apply Patch
AI Analysis

Impact

RedwoodSDK allows server functions exported from "use server" files to be invoked with GET requests instead of their intended HTTP methods when using versions 1.0.0‑beta.50 to 1.0.5. In applications that rely on cookie authentication and use SameSite=Lax headers, browsers automatically send the authentication cookie on top‑level GET requests. As a result, a malicious site can trigger state‑changing functions by simply loading a URL, enabling attackers to perform unintended actions without authorization. This constitutes a classic CSRF vulnerability that can affect any server‑side logic exposed through the framework.

Affected Systems

The vulnerability affects the RedwoodJS SDK, specifically server‑first React applications built with RedwoodSDK versions 1.0.0‑beta.50 through 1.0.5. All server functions defined in "use server" files, whether named handlers or exported bare functions, are impacted.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity. Although EPSS is not available and the issue is not listed in the KEV catalog, the attack vector is clear: a cross‑site GET request can exploit the flaw if the victim is authenticated with a SameSite=Lax cookie. The lack of a mitigation in earlier releases and the potential for state‑changing operations make exploitation highly likely in environments that expose these functions to the public. Monitoring for unusual requests can help detect exploitation, but the vulnerability's impact remains significant until patched.

Generated by OpenCVE AI on April 7, 2026 at 22:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade RedwoodSDK to version 1.0.6 or later

Generated by OpenCVE AI on April 7, 2026 at 22:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x8rx-789c-2pxq RedwoodSDK has a CSRF vulnerability in server function dispatch via GET requests
History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Redwoodjs
Redwoodjs sdk
Vendors & Products Redwoodjs
Redwoodjs sdk

Wed, 08 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing functions, because browsers send SameSite=Lax cookies on top-level GET requests. This affected all server functions -- both serverAction() handlers and bare exported functions in "use server" files. This vulnerability is fixed in 1.0.6.
Title RedwoodSDK has a CSRF vulnerability in server function dispatch via GET requests
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T17:46:55.661Z

Reserved: 2026-04-06T21:29:17.350Z

Link: CVE-2026-39371

cve-icon Vulnrichment

Updated: 2026-04-08T17:46:51.324Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T20:16:31.980

Modified: 2026-04-08T21:27:00.663

Link: CVE-2026-39371

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:46:16Z

Weaknesses