Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up
Package
Affected versions
>= 13.3.1-canary.0, < 14.2.35
>= 15.0.6, < 15.0.7
>= 15.1.10, < 15.1.11
>= 15.2.7, < 15.2.8
>= 15.3.7, < 15.3.8
>= 15.4.9, < 15.4.10
>= 15.5.8, < 15.5.9
>= 15.6.0-canary.59, < 15.6.0-canary.60
>= 16.0.9, < 16.0.10
>= 16.1.0-canary.17, < 16.1.0-canary.19
Patched versions
14.2.35
15.0.7
15.1.11
15.2.8
15.3.8
15.4.10
15.5.9
15.6.0-canary.60
16.0.10
16.1.0-canary.19
Description
Published by the National Vulnerability Database
Dec 12, 2025
Published to the GitHub Advisory Database
Dec 12, 2025
Reviewed
Dec 12, 2025
Last updated
Dec 12, 2025
It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and did not fully prevent denial-of-service attacks in all payload types. This affects React package versions 19.0.2, 19.1.3, and 19.2.2 and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-67779.
A malicious HTTP request can be crafted and sent to any Server Function endpoint that, when deserialized, can enter an infinite loop within the React Server Components runtime. This can cause the server process to hang and consume CPU, resulting in denial of service in unpatched environments.
References