Akamai to acquire LayerX to enforce AI usage control on any browser. Get details

CVE-2026-23864: React and Next.js Denial of Service via Memory Exhaustion

Share

Executive summary

We have been notified by our partners that a newly disclosed vulnerability (assigned CVE-2026-23864) that affects multiple React-based frameworks reveals a denial-of-service (DoS) vulnerability in React Server Components (RSCs). The Vercel team released a separate advisory detailing this vulnerability.

There have not been any observed in-the-wild exploitations of this vulnerability. Still, Akamai has deployed an Adaptive Security Engine Rapid Rule to protect our customers from this threat.

Vulnerability details

At the center of the issue is DoS attack due to memory exhaustion when specially crafted HTTP requests are sent to the respective web servers running React- or Next.js-based frameworks.

The DoS vulnerability arises from how React handles Server Function invocations within the RSC protocol and is exploitable only in frameworks that actively use RSCs.

Please note: This vulnerability does not require authentication, which makes exploitation easier.

The vulnerability is present in the following versions:

 

React

Vulnerable version(s)

Fixed version

19.0.0 or later

19.0.4

19.1.0 or later

19.1.5

19.2.0 or later

19.2.4

 

Next.js

Vulnerable version(s)

Fixed version

13.3 and canaries or later

[will not be fixed]

14.0 and canaries or later

[will not be fixed]

15.0.0 or later

15.0.8

15.1.0 or later

15.1.11

15.2.0 or later

15.2.9

15.3.0 or later

15.3.9

15.4.0 or later

15.4.11

15.5.0 or later

15.5.10

15 canaries or later

15.6.0-canary.61

16.0.0 or later

16.0.11

16.1.0 or later

16.1.5

16 canaries or later

16.2.0-canary.9

 

All RSC frameworks are vulnerable, which also includes:

  •  react-router
  •  waku
  •  @parcel/rsc
  •  @vite/rsc-plugin
  •  rwsdk

Mitigation with Akamai App & API Protector

On January 26, 2026, Akamai deployed an Adaptive Security Engine Rapid Rule for App & API Protector customers to provide full coverage.

  • 3000981 — Denial of Service In React/Next.js Vulnerability Detected (CVE-2026-23864)

Summary

A new rule within Akamai App & API Protector has been deployed to protect our customers from this DoS threat. However, the most effective defense will always be to promptly apply the patches provided by the vendor. Given the severity of this issue, any patches should be applied as soon as possible.

The Akamai Security Intelligence Group will continue to monitor, report on, and create mitigations for threats such as these for both our customers and the security community at large. To keep up with more breaking news from the Akamai Security Intelligence Group, check out our research home page and follow us on social media.

Tags

Share

Related Blog Posts

Security Research
One Is a Fluke, 3 Is a Pattern: MCP Back-End Vulnerabilities
May 12, 2026
Akamai researchers uncover vulnerabilities in three MCP servers. Learn about CVE-2025-66335 and how to secure your AI-to-backend connection.
Security Research
CVE-2026-34354: Guardicore Local Privilege Escalation Vulnerability
May 08, 2026
Read the technical details of a security vulnerability (CVE-2026-34354) in Akamai Guardicore Platform Agent for Windows — and get clear guidance on mitigation.
Security Research
The New Ouroboros Technique and How It Fits in dMSA’s Security Model
May 04, 2026
dMSA is more than a service account migration feature. Learn what its security model is trying to protect, how the implementation works, and where Ouroboros fits.