GHSA-5j59-xgg2-r9c4: Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up
(updated )
It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.
This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.
A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.
References
- github.com/advisories/GHSA-5j59-xgg2-r9c4
- github.com/vercel/next.js
- github.com/vercel/next.js/security/advisories/GHSA-5j59-xgg2-r9c4
- nextjs.org/blog/security-update-2025-12-11
- nvd.nist.gov/vuln/detail/CVE-2025-67779
- react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components
- www.cve.org/CVERecord?id=CVE-2025-55184
- www.facebook.com/security/advisories/cve-2025-67779
Code Behaviors & Features
Detect and mitigate GHSA-5j59-xgg2-r9c4 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →