Multiple high-severity vulnerabilities have been identified in React Server Components (RSC) and Next.js App Router implementations, exposing web applications to Remote Code Execution (RCE), Denial-of-Service (DoS), cache poisoning, and middleware bypass attacks. Security researchers disclosed that attackers can exploit flaws in the handling of specially crafted server requests to disrupt applications or potentially execute arbitrary code on affected systems. The vulnerabilities impact several widely used React server packages and frameworks that rely on RSC architecture, raising concerns due to the broad adoption of Next.js in production environments. The vulnerabilities stem from insecure deserialization and improper validation mechanisms within the React Server Components communication model, commonly known as the “Flight” protocol. By sending malicious HTTP requests to vulnerable server function endpoints, attackers may trigger excessive resource consumption, bypass protections, or manipulate server-side execution flows. Researchers also identified incomplete fixes in earlier patches, leading to additional vulnerabilities being discovered later. Public-facing applications using default or outdated configurations are considered at higher risk, and security experts have reported active scanning attempts targeting exposed deployments globally. Organizations using affected React and Next.js environments are advised to immediately upgrade to patched package versions and secure supported Next.js releases. Administrators should restrict unnecessary exposure of server function endpoints, enable runtime monitoring, and inspect logs for suspicious requests or unusual memory usage patterns. Implementing Web Application Firewall (WAF) protections, reviewing third-party dependencies, and conducting regular security assessments can further reduce the risk of exploitation and service disruption.
Hackers linked to the ShinyHunters extortion group have claimed responsibility for a data breach affecting Spanish fashion retailer exposing information belonging to more than 197,...
A cyber intrusion targeting the source code infrastructure of Trellix has reportedly been linked to the ransomware and extortion collectiveRansomHouse. The group recently posted se...
Cybersecurity researchers have uncovered a large-scale Android scam campaign involving fraudulent “call history” applications distributed through the Google Play Store. The mal...