<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>React | OKHK 👀</title><description>🤣 不一定客观，不一定理性，个人数字泔水\(⁠◔⁠‿⁠◔⁠)✨ Thinking...</description><link>https://okhk.pages.dev</link><item><title>🔴 另一些 RSC DoS 漏洞；请尽快更新</title><link>https://okhk.pages.dev/posts/8598</link><guid isPermaLink="true">https://okhk.pages.dev/posts/8598</guid><pubDate>Tue, 27 Jan 2026 05:13:50 GMT</pubDate><content:encoded>&lt;i&gt;&lt;b&gt;🔴&lt;/b&gt;&lt;/i&gt; 另一些 RSC DoS 漏洞；请尽快更新。&lt;br /&gt;&lt;br /&gt;- 此漏洞影响 Next.js 13-16 及其它使用了 &lt;mark&gt;React&lt;/mark&gt; Server Side Components 的相关组件。&lt;br /&gt;- 此漏洞不会导致 RCE。&lt;br /&gt;- 对于 &lt;mark&gt;React&lt;/mark&gt;，请更新到 19.0.4/19.1.5/19.2.4。&lt;br /&gt;- 对于 Next.js，请参考 [1] 或 [2] 中的更新方案。&lt;br /&gt;- Vercel [2] 及 Cloudflare [3] 已经发布针对此漏洞的服务端 WAF 规则。&lt;br /&gt;&lt;br /&gt;CVE: CVE-2026-23864&lt;br /&gt;CVSS: 7.5&lt;br /&gt;&lt;br /&gt;1. &lt;a href=&quot;https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions&quot; target=&quot;_blank&quot;&gt;react.dev/~&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;https://vercel.com/changelog/summary-of-cve-2026-23864&quot; target=&quot;_blank&quot;&gt;vercel.com/~&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;https://developers.cloudflare.com/changelog/2026-01-26-waf-release/&quot; target=&quot;_blank&quot;&gt;developers.cloudflare.com/~&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;thread: &lt;a href=&quot;https://t.me/outvivid/4795&quot; target=&quot;_blank&quot;&gt;/4795&lt;/a&gt;&lt;br /&gt;linksrc: &lt;a href=&quot;https://t.me/abcthoughts/6821&quot; target=&quot;_blank&quot;&gt;https://t.me/abcthoughts/6821&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/result?q=%23React&quot;&gt;#React&lt;/a&gt; &lt;a href=&quot;/search/result?q=%23Nextjs&quot;&gt;#Nextjs&lt;/a&gt;&lt;a href=&quot;https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;react.dev&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Critical Security Vulnerability in React Server Components – React&quot; src=&quot;/static/https://cdn4.telesco.pe/file/XQdnSRItda0HcHQ0U7mgIKUf_w5QjMKggPlvIqt1bPftMiNza8VhOhxujLgnoGQSK7kRK8EaWhXsi57YHLi8iczq--i-3WvRpKTNWX3rqX404pM1JqK3RVb1s0GYZfzuZN6zVfHH2-HQNwLKvyM9ETQf9ngCEhULOnYUf-dBGhhhWeCX5ctMHx5NjYAVfuOvmG4cvjtAjyAtJak5UbzruY64W3EpvYSoqHLFGjt7z2KfqohWjV1M2d2DzoM5ptOg1m8gQLeaMCwIBVmSWw7iiw4J7gxhxcDTNvEw0wht425K9BcwrB_PI_BoUY6WMuCe0UKyswX9XnUFyNt-bNXCmA.jpg&quot; width=&quot;1200&quot; height=&quot;630&quot; loading=&quot;eager&quot; /&gt;
  &lt;div&gt;Critical Security Vulnerability in &lt;mark&gt;React&lt;/mark&gt; Server Components – &lt;mark&gt;React&lt;/mark&gt;&lt;/div&gt;
  &lt;div&gt;The library for web and native user interfaces&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><title>#PSA: 一些新的 React DoS/源码泄露漏洞；请尽快更新</title><link>https://okhk.pages.dev/posts/8006</link><guid isPermaLink="true">https://okhk.pages.dev/posts/8006</guid><pubDate>Fri, 12 Dec 2025 04:37:10 GMT</pubDate><content:encoded>&lt;a href=&quot;/search/result?q=%23PSA&quot;&gt;#PSA&lt;/a&gt;: 一些&lt;b&gt;新的&lt;/b&gt; &lt;mark&gt;React&lt;/mark&gt; DoS/源码泄露漏洞；请尽快更新。&lt;br /&gt;&lt;br /&gt;- 如果上周已经就之前的 RCE 漏洞对 &lt;mark&gt;React&lt;/mark&gt; 等组件进行了更新，本周依旧&lt;b&gt;需要&lt;/b&gt;继续更新。&lt;br /&gt;- 如果就此漏洞更新到了 &lt;mark&gt;React&lt;/mark&gt; 19.0.2/19.1.3/19.2.2，也依旧&lt;b&gt;需要&lt;/b&gt;继续更新，因为这些版本的修复不完整。&lt;br /&gt;- 请参考 [2] 了解需要更新到的版本。&lt;br /&gt;- &lt;mark&gt;React&lt;/mark&gt; Server Side Components 相关；拒绝式服务攻击，以及服务端（服务端！）组件源码泄露。&lt;br /&gt;- Next.js 13.3 至 14（含 13.3 及 14.x）也受此漏洞影响。&lt;br /&gt;- &lt;mark&gt;react&lt;/mark&gt;-router、waku 和几个其它 RSC 组件也受此漏洞影响。&lt;br /&gt;&lt;br /&gt;CVE: CVE-2025-55184, CVE-2025-67779, CVE-2025-55183&lt;br /&gt;CVSS: 最高者为 7.5&lt;br /&gt;&lt;br /&gt;1. &lt;a href=&quot;https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components&quot; target=&quot;_blank&quot;&gt;react.dev/~&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions&quot; target=&quot;_blank&quot;&gt;react.dev/~&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;thread: &lt;a href=&quot;https://t.me/outvivid/4791&quot; target=&quot;_blank&quot;&gt;/4791&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/result?q=%23React&quot;&gt;#React&lt;/a&gt; &lt;a href=&quot;/search/result?q=%23Nextjs&quot;&gt;#Nextjs&lt;/a&gt;&lt;a href=&quot;https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;react.dev&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Critical Security Vulnerability in React Server Components – React&quot; src=&quot;/static/https://cdn4.telesco.pe/file/SyRzqfOmX1fBLaiyP44z8KXM6Q0sbJXTBT3URX04RQrgQs0_Tbf6rWTyU-MstBa8uZY-SUC5iL9hDlUfANk3dbjrVPJX2j6m6v08SALYMuYGMV-5JISivFU4jqdJ3Dh9-Rcq1yfNs-s-ZSE8PuPUiy1204xDUXtSYF5F3dQwxMQ3YBlFSUQwAbKmqREMzSxbiMQ2Px6SztE0gOPygosIDimldvdDOLMom6Bon6Mw4jfNTTwbutdv32pJuIeSN7evpRBJTCeoqgPfCAf84xOv5JOM-MlezNpfpaOJphLWrKP6IPE8qGQe4SCz2HzhMGdHhvVYmZm00607FFy7TLakdA.jpg&quot; width=&quot;1200&quot; height=&quot;630&quot; loading=&quot;eager&quot; /&gt;
  &lt;div&gt;Critical Security Vulnerability in &lt;mark&gt;React&lt;/mark&gt; Server Components – &lt;mark&gt;React&lt;/mark&gt;&lt;/div&gt;
  &lt;div&gt;The library for web and native user interfaces&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><title>#PSA: React RSC 的 RCE 漏洞，影响 Next.js 等，受影响用户请立即更新</title><link>https://okhk.pages.dev/posts/7914</link><guid isPermaLink="true">https://okhk.pages.dev/posts/7914</guid><pubDate>Wed, 03 Dec 2025 18:25:27 GMT</pubDate><content:encoded>&lt;a href=&quot;/search/result?q=%23PSA&quot;&gt;#PSA&lt;/a&gt;: &lt;mark&gt;React&lt;/mark&gt; RSC 的 RCE 漏洞，影响 Next.js 等，受影响用户请立即更新。&lt;br /&gt;&lt;br /&gt;- 受影响版本包括 &lt;mark&gt;React&lt;/mark&gt; 19.0/19.1.0/19.1.1/19.2.0 及 Next.js 15-16（以及个别 14 canary 版本）。 [1][2]&lt;br /&gt;- 受影响用户请更新至 &lt;mark&gt;React&lt;/mark&gt; 19.0.1/19.1.2/19.2.1 及 Next.js 15.0.5/15.1.9/15.2.6/15.3.6/15.4.8/15.5.7/16.0.7。&lt;br /&gt;- &lt;mark&gt;React&lt;/mark&gt; Server DOM 的反序列化逻辑存在问题，可能导致远程代码执行 (RCE) 漏洞。&lt;br /&gt;- Cloudflare WAF 已部署修复并默认启用。 [3]&lt;br /&gt;- 应用程序如果只在客户端使用 &lt;mark&gt;React&lt;/mark&gt; 而不涉及服务端 &lt;mark&gt;React&lt;/mark&gt;，则不受影响。&lt;br /&gt;- &lt;mark&gt;react&lt;/mark&gt;-router 或 waku 等库的用户可能也会受到影响。用户可以检查应用程序是否使用了 &lt;mark&gt;react&lt;/mark&gt;-server-dom-{webpack,parcel,turbopack} 包。&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;CVE: CVE-2025-55182 (&lt;mark&gt;React&lt;/mark&gt;), CVE-2025-66478 (Next.js)&lt;br /&gt;CVSS: 10.0/10 (Critical)&lt;br /&gt;&lt;br /&gt;1. &lt;a href=&quot;https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components&quot; target=&quot;_blank&quot;&gt;react.dev/~&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;https://github.com/vercel/next.js/security/advisories/GHSA-9qr9-h5gf-34mp&quot; target=&quot;_blank&quot;&gt;GHSA-9qr9-h5gf-34mp&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;https://blog.cloudflare.com/waf-rules-react-vulnerability/&quot; target=&quot;_blank&quot;&gt;blog.cloudflare.com/~&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/result?q=%23React&quot;&gt;#React&lt;/a&gt; &lt;a href=&quot;/search/result?q=%23Nextjs&quot;&gt;#Nextjs&lt;/a&gt;&lt;a href=&quot;https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;react.dev&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Critical Security Vulnerability in React Server Components – React&quot; src=&quot;/static/https://cdn4.telesco.pe/file/lKI3uyPzANtKD5Vn8FirrTiqsEpvXl5qHWlsT0sGiwwtO2u20GQGUD-Gr3j3ro0CtAPBFa0yBpM90OUDok-JpIlVZIEwmX3EpyWjLdkmnyny_LcuU4owG1TtqC9UOHUm0FOXM4DIsg_28uxLowGQYblHwSQND83rc9A8ksfJCuevgDTHjVu9iK2tRk4-9OBydw_IkjjPE8HW5rcNgyA8GP_fC-GsC0FoUw28zlZtbmVMYuJnqBjDbk4jMPxPGwuOl51iLewO-18TAZ6y-rHD3i9GEV9v-eISN_cp_9jGRsuj2AYkf7ahERyMkvnolpjLjfWG-yyJFt7PrceKKIo2cQ.jpg&quot; width=&quot;1200&quot; height=&quot;630&quot; loading=&quot;eager&quot; /&gt;
  &lt;div&gt;Critical Security Vulnerability in &lt;mark&gt;React&lt;/mark&gt; Server Components – &lt;mark&gt;React&lt;/mark&gt;&lt;/div&gt;
  &lt;div&gt;The library for web and native user interfaces&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>