Critical Vulnerabilities in Next.js & React Server Components Demand Immediate Patching

Critical Security Flaws in Next.js and React Server Components: Immediate Action Required

In a significant development for web developers and organizations utilizing Next.js and React Server Components, Vercel has issued a series of security advisories addressing multiple critical vulnerabilities. These flaws, if exploited, could lead to severe consequences, including denial-of-service attacks, unauthorized access, and server-side request forgery. Immediate attention and action are imperative to safeguard applications and sensitive data.

Denial of Service via React Server Components (CVE-2026-23870)

A high-severity vulnerability, identified as CVE-2026-23870, affects React Server Components packages for versions 19.x and all Next.js App Router deployments on versions 13.x through 16.x. This flaw allows attackers to send specially crafted HTTP requests to any App Router Server Function endpoint. Upon deserialization, these requests can trigger excessive CPU usage, effectively leading to denial-of-service (DoS) conditions in unpatched environments. The root cause lies in the React Flight protocol’s deserialization logic, which inadequately enforces structural or type constraints on incoming payloads.

Middleware and Proxy Authorization Bypass

Three separate advisories have been issued concerning middleware bypass vulnerabilities in App Router applications. These vulnerabilities arise from the handling of `.rsc` and segment-prefetch URLs, which can resolve to the same page without being matched by intended middleware rules. Consequently, protected content can be accessed without proper authorization checks. The patches now include App Router transport variants when generating middleware matchers, ensuring consistent application of middleware protections across all request types, including prefetch variants. Until an upgrade is feasible, developers are advised to enforce authorization directly within the underlying route or page logic, rather than relying solely on middleware.

Server-Side Request Forgery via WebSocket Upgrade Requests (CVE-2026-44578)

CVE-2026-44578 is a high-severity flaw that enables server-side request forgery (SSRF) through crafted WebSocket upgrade requests on self-hosted Node.js deployments. An attacker can manipulate the server into proxying requests to arbitrary internal or external destinations, potentially exposing internal services or cloud metadata endpoints. This scenario is particularly dangerous in cloud-native environments. Notably, Vercel-hosted deployments are unaffected. The fix applies the same safety checks to WebSocket upgrade handling that already exist for standard HTTP requests.

Pages Router i18n Middleware Bypass (CVE-2026-44573)

CVE-2026-44573 affects applications using the Pages Router with internationalization (i18n) configured alongside middleware-based authorization. Locale-less `/_next/data//.json` requests can bypass middleware entirely, enabling attackers to retrieve server-side rendered JSON for protected pages without passing authorization checks. The matcher logic has been updated to apply consistent matching across both prefixed and unprefixed data routes.

Additional Vulnerabilities and Patches

Beyond these high-severity flaws, Vercel has also addressed several moderate and low-severity issues. These include cross-site scripting (XSS) vulnerabilities in App Router applications using Content Security Policy (CSP) nonces and in `beforeInteractive` scripts with untrusted input. Developers are strongly encouraged to review the full list of advisories and apply the necessary patches to mitigate these risks.

Immediate Steps for Developers

1. Review and Update Dependencies: Ensure that all Next.js and React Server Components dependencies are updated to the latest patched versions.

2. Audit Middleware Implementations: Examine middleware configurations to confirm that authorization checks are enforced directly within route or page logic, especially if an immediate upgrade is not possible.

3. Monitor for Unusual Activity: Implement monitoring to detect potential exploitation attempts, such as unexpected CPU spikes or unauthorized access patterns.

4. Apply Security Best Practices: Regularly review and adhere to security best practices, including input validation, proper error handling, and the principle of least privilege.

Conclusion

The discovery of these critical vulnerabilities underscores the importance of proactive security measures in web development. By promptly applying the provided patches and adhering to recommended security practices, developers can protect their applications and users from potential exploits. Staying informed and vigilant is essential in the ever-evolving landscape of cybersecurity threats.