Skip to content

Commit e44d3b7

Browse files
authored
Add additional DoS CVE (#8196)
1 parent 72f8998 commit e44d3b7

File tree

1 file changed

+22
-8
lines changed

1 file changed

+22
-8
lines changed

src/content/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components.md

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,16 +23,18 @@ Security researchers have found and disclosed two additional vulnerabilities in
2323

2424
The new vulnerabilities are disclosed as:
2525

26-
- **Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) (CVSS 7.5)
26+
- **Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) (CVSS 7.5)
2727
- **Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
2828

2929
We recommend upgrading immediately due to the severity of the newly disclosed vulnerabilities.
3030

3131
<Note>
3232

33-
#### The patches published last week are vulnerable. {/*the-patches-published-last-week-are-vulnerable*/}
33+
#### The patches published earlier are vulnerable. {/*the-patches-published-earlier-are-vulnerable*/}
3434

35-
If you already updated for the Critical Security Vulnerability, you will need to update again.
35+
If you already updated for the Critical Security Vulnerability last week, you will need to update again.
36+
37+
If you updated to 19.0.2, 19.1.3, and 19.2.2, [these are incomplete](#additional-fix-published) and you will need to update again.
3638

3739
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
3840

@@ -44,13 +46,13 @@ Further details of these vulnerabilities will be provided after the rollout of t
4446

4547
These vulnerabilities are present in the same packages and versions as [CVE-2025-55182](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components).
4648

47-
This includes versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1 of:
49+
This includes versions 19.0.0, 19.0.1, 19.0.2, 19.1.0, 19.1.1, 19.1.2, 19.1.2, 19.2.0, 19.2.1 and 19.2.2 of:
4850

4951
* [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack)
5052
* [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel)
5153
* [react-server-dom-turbopack](https://www.npmjs.com/package/react-server-dom-turbopack?activeTab=readme)
5254

53-
Fixes were backported to versions 19.0.2, 19.1.3, and 19.2.2. If you are using any of the above packages please upgrade to any of the fixed versions immediately.
55+
Fixes were backported to versions 19.0.3, 19.1.4, and 19.2.3. If you are using any of the above packages please upgrade to any of the fixed versions immediately.
5456

5557
As before, if your app’s React code does not use a server, your app is not affected by these vulnerabilities. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by these vulnerabilities.
5658

@@ -94,7 +96,7 @@ See [this issue](https://github.com/facebook/react-native/issues/54772#issuecomm
9496

9597
## High Severity: Denial of Service {/*high-severity-denial-of-service*/}
9698

97-
**CVE:** [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184)
99+
**CVEs:** [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779)
98100
**Base Score:** 7.5 (High)
99101

100102
Security researchers have discovered that a malicious HTTP request can be crafted and sent to any Server Functions endpoint that, when deserialized by React, can cause an infinite loop that hangs the server process and consumes CPU. Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
@@ -103,6 +105,17 @@ This creates a vulnerability vector where an attacker may be able to deny users
103105

104106
The patches published today mitigate by preventing the infinite loop.
105107

108+
<Note>
109+
110+
#### Additional fix published {/*additional-fix-published*/}
111+
112+
The original fix addressing the DoS in [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) was incomplete.
113+
114+
This left versions 19.0.2, 19.1.3, 19.2.2 vulnerable. Versions 19.0.3, 19.1.4, 19.2.3 are safe.
115+
116+
We've fixed the additional cases and filed [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) for the vulnerable versions.
117+
118+
</Note>
106119

107120
## Medium Severity: Source Code Exposure {/*low-severity-source-code-exposure*/}
108121

@@ -154,11 +167,12 @@ Always verify against production bundles.
154167
* **December 7th**: Initial fixes created and the React team began verifying and planning new patch.
155168
* **December 8th**: Affected hosting providers and open source projects notified.
156169
* **December 10th**: Hosting provider mitigations in place and patches verified.
157-
* **December 11th**: Additional DoS reported to [Meta Bug Bounty](https://bugbounty.meta.com/) and added to patch.
170+
* **December 11th**: Additional DoS reported to [Meta Bug Bounty](https://bugbounty.meta.com/) by Shinsaku Nomura.
158171
* **December 11th**: Patches published and publicly disclosed as [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) and [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184).
172+
* **December 11th**: Missing DoS case found internally, patched and publicly disclosed as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).
159173

160174
---
161175

162176
## Attribution {/*attribution*/}
163177

164-
Thank you to [Andrew MacPherson (AndrewMohawk)](https://github.com/AndrewMohawk) for reporting the Source Code Exposure, [RyotaK](https://ryotak.net) from GMO Flatt Security Inc for reporting the initial Denial of Service vulnerability.
178+
Thank you to [Andrew MacPherson (AndrewMohawk)](https://github.com/AndrewMohawk) for reporting the Source Code Exposure, [RyotaK](https://ryotak.net) from GMO Flatt Security Inc and Shinsaku Nomura of Bitforest Co., Ltd. for reporting the Denial of Service vulnerabilities.

0 commit comments

Comments
 (0)