Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities Patched in Next.js and React

Critical Vulnerabilities Patched in Next.js and React

Posted on May 8, 2026 By CWS

Vercel has issued critical security updates for Next.js, addressing numerous vulnerabilities that could impact the security and performance of applications. The advisories cover issues such as denial-of-service, middleware bypass, server-side request forgery, and cross-site scripting. These vulnerabilities affect Next.js versions 13.x through 16.x and React Server Components for versions 19.x.

Denial of Service Vulnerability

A significant denial-of-service flaw, identified as CVE-2026-23870, impacts React Server Components in version 19.x and all affected Next.js App Router deployments. This vulnerability can be exploited by sending specifically crafted HTTP requests that lead to excessive CPU usage, causing service disruptions. The root cause lies in the ‘Flight’ protocol’s deserialization logic, which does not enforce necessary constraints on incoming payloads.

Middleware and Proxy Authorization Issues

Several vulnerabilities, including GHSA-267c-6grr-h53f, GHSA-26hh-7cqf-hhc6, and GHSA-492v-c6pp-mqqv, involve middleware bypasses in App Router applications. Crafted URLs can bypass middleware rules, allowing unauthorized access to protected content. The update ensures consistent application of middleware protections across all request types. Until upgrades are feasible, developers should implement authorization within route or page logic.

Server-Side Request Forgery and Other Vulnerabilities

CVE-2026-44578, a high-risk server-side request forgery vulnerability, can be exploited via crafted WebSocket upgrade requests in self-hosted Node.js setups. This flaw enables attackers to manipulate servers into proxying requests to unauthorized destinations. While Vercel-hosted deployments remain unaffected, the fix applies stringent safety checks to WebSocket handling.

Additionally, CVE-2026-44573 affects Pages Router applications with i18n and middleware-based authorization, allowing JSON data retrieval without proper checks. Updates ensure consistent matcher logic across all data routes.

Several moderate and low-severity issues have also been addressed, including cross-site scripting vulnerabilities, cache poisoning, and connection exhaustion denial-of-service flaws. Organizations using impacted Next.js versions should upgrade immediately or apply interim mitigations, such as enhanced route logic authorization and network restriction measures.

As cybersecurity threats evolve, maintaining updated software is crucial for safeguarding applications. By addressing these vulnerabilities, developers can protect their systems from potential attacks and ensure robust security.

Cyber Security News Tags:cross-site scripting, Cybersecurity, denial of service, middleware bypass, Next.js, React, security update, server-side request forgery, software upgrade, Vulnerabilities

Post navigation

Previous Post: Critical Linux Vulnerability ‘Dirty Frag’ Exposed
Next Post: Ivanti Releases Critical Zero-Day Patch for EPMM

Related Posts

Hackers Advertised VOID ‘AV Killer’ with Kernel-level Termination Claims Hackers Advertised VOID ‘AV Killer’ with Kernel-level Termination Claims Cyber Security News
Beware of Free Video Game Cheats That Delivers Infostealer Malwares Beware of Free Video Game Cheats That Delivers Infostealer Malwares Cyber Security News
Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT Cyber Security News
LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code Cyber Security News
Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks Cyber Security News
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Claude Extension Flaw in Chrome Risks AI Takeover
  • Linux Kernel Vulnerability Exposes Root Access Risk
  • Ivanti Releases Critical Zero-Day Patch for EPMM
  • Critical Vulnerabilities Patched in Next.js and React
  • Critical Linux Vulnerability ‘Dirty Frag’ Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Claude Extension Flaw in Chrome Risks AI Takeover
  • Linux Kernel Vulnerability Exposes Root Access Risk
  • Ivanti Releases Critical Zero-Day Patch for EPMM
  • Critical Vulnerabilities Patched in Next.js and React
  • Critical Linux Vulnerability ‘Dirty Frag’ Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark