Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities Patched in Next.js and React

Critical Vulnerabilities Patched in Next.js and React

Posted on May 8, 2026 By CWS

Vercel has issued critical security updates for Next.js, addressing numerous vulnerabilities that could impact the security and performance of applications. The advisories cover issues such as denial-of-service, middleware bypass, server-side request forgery, and cross-site scripting. These vulnerabilities affect Next.js versions 13.x through 16.x and React Server Components for versions 19.x.

Denial of Service Vulnerability

A significant denial-of-service flaw, identified as CVE-2026-23870, impacts React Server Components in version 19.x and all affected Next.js App Router deployments. This vulnerability can be exploited by sending specifically crafted HTTP requests that lead to excessive CPU usage, causing service disruptions. The root cause lies in the ‘Flight’ protocol’s deserialization logic, which does not enforce necessary constraints on incoming payloads.

Middleware and Proxy Authorization Issues

Several vulnerabilities, including GHSA-267c-6grr-h53f, GHSA-26hh-7cqf-hhc6, and GHSA-492v-c6pp-mqqv, involve middleware bypasses in App Router applications. Crafted URLs can bypass middleware rules, allowing unauthorized access to protected content. The update ensures consistent application of middleware protections across all request types. Until upgrades are feasible, developers should implement authorization within route or page logic.

Server-Side Request Forgery and Other Vulnerabilities

CVE-2026-44578, a high-risk server-side request forgery vulnerability, can be exploited via crafted WebSocket upgrade requests in self-hosted Node.js setups. This flaw enables attackers to manipulate servers into proxying requests to unauthorized destinations. While Vercel-hosted deployments remain unaffected, the fix applies stringent safety checks to WebSocket handling.

Additionally, CVE-2026-44573 affects Pages Router applications with i18n and middleware-based authorization, allowing JSON data retrieval without proper checks. Updates ensure consistent matcher logic across all data routes.

Several moderate and low-severity issues have also been addressed, including cross-site scripting vulnerabilities, cache poisoning, and connection exhaustion denial-of-service flaws. Organizations using impacted Next.js versions should upgrade immediately or apply interim mitigations, such as enhanced route logic authorization and network restriction measures.

As cybersecurity threats evolve, maintaining updated software is crucial for safeguarding applications. By addressing these vulnerabilities, developers can protect their systems from potential attacks and ensure robust security.

Cyber Security News Tags:cross-site scripting, Cybersecurity, denial of service, middleware bypass, Next.js, React, security update, server-side request forgery, software upgrade, Vulnerabilities

Post navigation

Previous Post: Critical Linux Vulnerability ‘Dirty Frag’ Exposed
Next Post: Ivanti Releases Critical Zero-Day Patch for EPMM

Related Posts

Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems Cyber Security News
Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters Cyber Security News
Cybersecurity Alert: Fake CAPTCHA Attack Endangers Enterprises Cybersecurity Alert: Fake CAPTCHA Attack Endangers Enterprises Cyber Security News
Hackers Stolen Over 0 million by Exploiting Balancer DeFi protocol Hackers Stolen Over $100 million by Exploiting Balancer DeFi protocol Cyber Security News
SecurityMetrics Wins “Data Leak Detection Solution of the Year” at the 2025 CyberSecurity Breakthrough Awards SecurityMetrics Wins “Data Leak Detection Solution of the Year” at the 2025 CyberSecurity Breakthrough Awards Cyber Security News
Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ivanti Releases Critical Zero-Day Patch for EPMM
  • Critical Vulnerabilities Patched in Next.js and React
  • Critical Linux Vulnerability ‘Dirty Frag’ Exposed
  • Cisco Resolves Critical Flaws in Enterprise Solutions
  • Hackers Exploit Google Ads to Target ManageWP Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ivanti Releases Critical Zero-Day Patch for EPMM
  • Critical Vulnerabilities Patched in Next.js and React
  • Critical Linux Vulnerability ‘Dirty Frag’ Exposed
  • Cisco Resolves Critical Flaws in Enterprise Solutions
  • Hackers Exploit Google Ads to Target ManageWP Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark