<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Vitejs — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/vitejs/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 14:51:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/vitejs/feed.xml" rel="self" type="application/rss+xml"/><item><title>@vitejs/plugin-rsc Denial-of-Service Vulnerability in React Server Components</title><link>https://feed.craftedsignal.io/briefs/2026-05-vitejs-rsc-dos/</link><pubDate>Mon, 11 May 2026 14:51:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vitejs-rsc-dos/</guid><description>@vitejs/plugin-rsc is vulnerable to a denial-of-service attack due to an embedded vulnerable version of react-server-dom-webpack, potentially causing resource exhaustion.</description><content:encoded><![CDATA[<p>The <code>@vitejs/plugin-rsc</code> package, used for React Server Components, is vulnerable to a denial-of-service (DoS) attack. This vulnerability stems from the fact that <code>@vitejs/plugin-rsc</code> vendors <code>react-server-dom-webpack</code>, a component that had a known vulnerability in versions prior to 19.2.6. Attackers could exploit this by sending crafted requests that consume excessive server resources, leading to service disruption or unavailability. The affected versions of <code>@vitejs/plugin-rsc</code> are those equal to or below 0.5.25. Upgrading to version 0.5.26 or later resolves this issue, incorporating the patched version of <code>react-server-dom-webpack</code>. This vulnerability poses a risk to applications using React Server Components with the vulnerable plugin, emphasizing the need for immediate patching. The related CVE ID is CVE-2026-23870.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a server running a vulnerable version of <code>@vitejs/plugin-rsc</code>.</li>
<li>The attacker crafts a malicious HTTP request designed to trigger excessive resource consumption in the React Server Components rendering process.</li>
<li>The request is sent to a server endpoint handled by the vulnerable <code>@vitejs/plugin-rsc</code> plugin.</li>
<li>Upon receiving the request, the server attempts to process the React Server Component, leading to uncontrolled resource allocation via the vulnerable <code>react-server-dom-webpack</code> dependency.</li>
<li>The server&rsquo;s memory or CPU resources are exhausted due to the unbounded resource allocation.</li>
<li>Legitimate users are unable to access the server due to resource starvation.</li>
<li>The server becomes unresponsive or crashes, resulting in a denial-of-service condition.</li>
<li>Continuous malicious requests maintain the DoS state, preventing recovery without intervention.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete denial of service, rendering affected applications unavailable to users. While the exact number of potential victims is unknown, any application relying on <code>@vitejs/plugin-rsc</code> versions 0.5.25 or earlier is at risk. This can impact various sectors and organizations utilizing React Server Components, resulting in business disruption, reputational damage, and potential financial losses due to downtime. The high CVSS score of 7.5 reflects the severity of the potential impact on availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>@vitejs/plugin-rsc@0.5.26</code> or later to patch the vulnerability and mitigate the risk of denial-of-service attacks as mentioned in the advisory (<a href="https://github.com/advisories/GHSA-w94c-4vhp-22gx)">https://github.com/advisories/GHSA-w94c-4vhp-22gx)</a>.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block malicious requests targeting the vulnerable endpoint to provide an additional layer of protection while patching is in progress.</li>
<li>Monitor web server logs for unusual activity, such as a sudden spike in resource consumption or a high volume of requests to specific endpoints, to detect potential exploitation attempts.</li>
<li>Implement resource limits on the server to prevent a single request from exhausting all available resources, mitigating the impact of a successful denial-of-service attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>react</category><category>vite</category></item></channel></rss>