The React team has disclosed new security vulnerabilities in React Server Components (RSC), following the previous critical RCE patch. These vulnerabilities, categorized as Denial of Service (DoS) and Source Code Exposure, pose significant risks to applications using RSC. Immediate action is required for all affected projects. The official disclosure can be found on the React blog as the primary source.
![]()
🔥 Vulnerability Summary and Affected Versions
The newly disclosed issues fall into two categories: high-severity DoS attacks and a medium-severity source code leak.
| Vulnerability Type | CVE ID | CVSS Score | Severity | Primary Impact |
|---|---|---|---|---|
| Denial of Service | CVE-2025-55184, CVE-2025-67779 | 7.5 | High | Server process hang, excessive CPU usage |
| Denial of Service | CVE-2026-23864 | 7.5 | High | Server crash, out-of-memory exceptions |
| Source Code Exposure | CVE-2025-55183 | 5.3 | Medium | Server Function source code leak |
Affected Packages & Versions:
Versions 19.0.0 through 19.2.3 of react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack are vulnerable.
Immediate Upgrade Target: Update to version 19.0.4, 19.1.5, or 19.2.4 and above.

🛡️ Action Guide for Developers
-
Check Dependencies and Update:
// Example package.json { "dependencies": { // Update to one of these safe versions immediately. "react-server-dom-webpack": "^19.2.4", "react-server-dom-turbopack": "^19.2.4" // react and react-dom can remain at their current versions to avoid mismatch errors. } }Run
npm updateoryarn upgradein your terminal. -
Framework Users: If you're using Next.js, React Router, Waku, or other affected frameworks, ensure they are also updated to their latest versions.
-
React Native Users: No action is needed if you're not using a monorepo. In a monorepo, only update the vulnerable server packages listed above.
-
Hosting Provider Mitigations: Major providers like Vercel have applied temporary mitigations, but you should not rely on them. Apply the patches directly.

💡 Conclusion and Key Takeaways
These vulnerabilities highlight the risks associated with deserializing untrusted data in Server Components. The DoS vectors can cripple server availability, making immediate patching the most critical step.
While apps not using Server Components are unaffected, indirect risk exists if your framework or bundler supports RSC. After applying the patches, enhance your server monitoring to detect anomalies promptly. Remember, security is an ongoing process, not a one-time update.