@vitejs/plugin-rsc Denial-of-Service Vulnerability in React Server Components
@vitejs/plugin-rsc is vulnerable to a denial-of-service attack due to an embedded vulnerable version of react-server-dom-webpack, potentially causing resource exhaustion.
The @vitejs/plugin-rsc package, used for React Server Components, is vulnerable to a denial-of-service (DoS) attack. This vulnerability stems from the fact that @vitejs/plugin-rsc vendors react-server-dom-webpack, a component that had a known vulnerability in versions prior to 19.2.6. Attackers could exploit this by sending crafted requests that consume excessive server resources, leading to service disruption or unavailability. The affected versions of @vitejs/plugin-rsc are those equal to or below 0.5.25. Upgrading to version 0.5.26 or later resolves this issue, incorporating the patched version of react-server-dom-webpack. This vulnerability poses a risk to applications using React Server Components with the vulnerable plugin, emphasizing the need for immediate patching. The related CVE ID is CVE-2026-23870.
Attack Chain
- An attacker identifies a server running a vulnerable version of
@vitejs/plugin-rsc. - The attacker crafts a malicious HTTP request designed to trigger excessive resource consumption in the React Server Components rendering process.
- The request is sent to a server endpoint handled by the vulnerable
@vitejs/plugin-rscplugin. - Upon receiving the request, the server attempts to process the React Server Component, leading to uncontrolled resource allocation via the vulnerable
react-server-dom-webpackdependency. - The server’s memory or CPU resources are exhausted due to the unbounded resource allocation.
- Legitimate users are unable to access the server due to resource starvation.
- The server becomes unresponsive or crashes, resulting in a denial-of-service condition.
- Continuous malicious requests maintain the DoS state, preventing recovery without intervention.
Impact
Successful exploitation of this vulnerability can lead to complete denial of service, rendering affected applications unavailable to users. While the exact number of potential victims is unknown, any application relying on @vitejs/plugin-rsc versions 0.5.25 or earlier is at risk. This can impact various sectors and organizations utilizing React Server Components, resulting in business disruption, reputational damage, and potential financial losses due to downtime. The high CVSS score of 7.5 reflects the severity of the potential impact on availability.
Recommendation
- Upgrade to
@vitejs/plugin-rsc@0.5.26or later to patch the vulnerability and mitigate the risk of denial-of-service attacks as mentioned in the advisory (https://github.com/advisories/GHSA-w94c-4vhp-22gx). - Deploy a web application firewall (WAF) with rules to detect and block malicious requests targeting the vulnerable endpoint to provide an additional layer of protection while patching is in progress.
- Monitor web server logs for unusual activity, such as a sudden spike in resource consumption or a high volume of requests to specific endpoints, to detect potential exploitation attempts.
- Implement resource limits on the server to prevent a single request from exhausting all available resources, mitigating the impact of a successful denial-of-service attack.
Detection coverage 2
Detect CVE-2026-23870 Exploitation Attempt - High Resource Consumption
highDetects CVE-2026-23870 exploitation attempt — monitors web server logs for suspicious patterns indicative of resource exhaustion attacks against @vitejs/plugin-rsc
Detect CVE-2026-23870 Exploitation Attempt - Repeated Requests
mediumDetects CVE-2026-23870 exploitation attempt — alerts on repeated requests to specific endpoints, potentially indicating a denial-of-service attempt.
Detection queries are available on the platform. Get full rules →