You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/blog/2025/12/03/critical-security-vulnerability-in-react-server-components.md
+1-10Lines changed: 1 addition & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,12 +64,7 @@ React Server Components に、認証不要のリモートコード実行の脆
64
64
65
65
-**Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) and [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) (CVSS 7.5)
66
66
-**Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
Fixes were backported to versions 19.0.4, 19.1.5, and 19.2.4. If you are using any of the above packages please upgrade to any of the fixed versions immediately.
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
Security researchers discovered additional DoS vulnerabilities still exist in React Server Components.
111
+
セキュリティ研究者により、React Server Components に追加の DoS 脆弱性が残っていることが発見されました。
133
112
134
-
The vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints, and could lead to server crashes, out-of-memory exceptions or excessive CPU usage; depending on the vulnerable code path being exercised, the application configuration and application code.
113
+
これらの脆弱性は、特別に細工された HTTP リクエストをサーバ関数 (Server Function) エンドポイントに送信することで引き起こされます。実行される脆弱なコード経路、アプリケーション設定、およびアプリケーションコードに応じて、サーバクラッシュ、メモリ不足例外、または過剰な CPU 使用率につながる可能性があります。
135
114
136
-
The patches published January 26th mitigate these DoS vulnerabilities.
115
+
1 月 26 日に公開されたパッチは、これらの DoS 脆弱性を緩和します。
137
116
138
117
<Note>
139
118
140
-
#### Additional fixes published {/*additional-fix-published*/}
119
+
#### 追加の修正が公開されました {/*additional-fix-published*/}
141
120
142
-
The original fix addressing the DoS in [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184)was incomplete.
121
+
[CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184)の DoS に対処する元の修正は不完全でした。
143
122
144
-
This left previous versions vulnerable. Versions 19.0.4, 19.1.5, 19.2.4 are safe.
***12 月 11 日**:不足していた DoS のケースが内部で発見され、修正が適用され [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779) として一般公開。
236
-
237
-
=======
238
-
## Timeline {/*timeline*/}
239
-
***December 3rd**: Leak reported to Vercel and [Meta Bug Bounty](https://bugbounty.meta.com/) by [Andrew MacPherson](https://github.com/AndrewMohawk).
240
-
***December 4th**: Initial DoS reported to [Meta Bug Bounty](https://bugbounty.meta.com/) by [RyotaK](https://ryotak.net).
241
-
***December 6th**: Both issues confirmed by the React team, and the team began investigating.
242
-
***December 7th**: Initial fixes created and the React team began verifying and planning new patch.
243
-
***December 8th**: Affected hosting providers and open source projects notified.
244
-
***December 10th**: Hosting provider mitigations in place and patches verified.
245
-
***December 11th**: Additional DoS reported to [Meta Bug Bounty](https://bugbounty.meta.com/) by Shinsaku Nomura.
246
-
***December 11th**: Patches published and publicly disclosed as [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) and [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184).
247
-
***December 11th**: Missing DoS case found internally, patched and publicly disclosed as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).
248
-
***January 26th**: Additional DoS cases found, patched, and publicly disclosed as [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864).
249
-
>>>>>>> bd87c394dc1daf0e54759126f847fcfa927e5a75
197
+
***1 月 26 日**:追加の DoS ケースが発見され、修正が適用され [CVE-2026-23864](https://www.cve.org/CVERecord?id=CVE-2026-23864) として一般公開。
Thank you to [Andrew MacPherson (AndrewMohawk)](https://github.com/AndrewMohawk) for reporting the Source Code Exposure, [RyotaK](https://ryotak.net) from GMO Flatt Security Inc and Shinsaku Nomura of Bitforest Co., Ltd. for reporting the Denial of Service vulnerabilities. Thank you to [Mufeed VH](https://x.com/mufeedvh) from [Winfunc Research](https://winfunc.com), [Joachim Viide](https://jviide.iki.fi), [RyotaK](https://ryotak.net) from [GMO Flatt Security Inc](https://flatt.tech/en/) and Xiangwei Zhang of Tencent Security YUNDING LAB for reporting the additional DoS vulnerabilities.
You can think of Effect Events as being very similar to event handlers. The main difference is that event handlers run in response to user interactions, whereas Effect Events are triggered by you from Effects. Effect Events let you "break the chain" between the reactivity of Effects and code that should not be reactive.
575
-
>>>>>>> bd87c394dc1daf0e54759126f847fcfa927e5a75
576
572
577
573
### エフェクトイベントで最新の props や state を読み取る {/*reading-latest-props-and-state-with-effect-events*/}
0 commit comments