FKIE_CVE-2026-39371
Vulnerability from fkie_nvd - Published: 2026-04-07 20:16 - Updated: 2026-04-24 18:14
Severity ?
Summary
RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing functions, because browsers send SameSite=Lax cookies on top-level GET requests. This affected all server functions -- both serverAction() handlers and bare exported functions in "use server" files. This vulnerability is fixed in 1.0.6.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| rwsdk | redwoodsdk | * | |
| rwsdk | redwoodsdk | 1.0.0 | |
| rwsdk | redwoodsdk | 1.0.0 | |
| rwsdk | redwoodsdk | 1.0.0 | |
| rwsdk | redwoodsdk | 1.0.0 | |
| rwsdk | redwoodsdk | 1.0.0 | |
| rwsdk | redwoodsdk | 1.0.0 | |
| rwsdk | redwoodsdk | 1.0.0 | |
| rwsdk | redwoodsdk | 1.0.0 | |
| rwsdk | redwoodsdk | 1.0.0 | |
| rwsdk | redwoodsdk | 1.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "7B0DDEBA-52C7-4DB5-B9C4-F2636D7FE425",
"versionEndExcluding": "1.0.6",
"versionStartIncluding": "1.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta50:*:*:*:node.js:*:*",
"matchCriteriaId": "8CA41DCF-0A52-41C1-B8A7-43A4986E82C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta51:*:*:*:node.js:*:*",
"matchCriteriaId": "1D6A8507-049F-4178-9F35-75DCF2FABA1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta52:*:*:*:node.js:*:*",
"matchCriteriaId": "732B2AC5-641D-4A10-943E-81D3E45B3B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta53:*:*:*:node.js:*:*",
"matchCriteriaId": "87581662-D0DE-4C41-A69B-FE9904E64309",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta53_test20260205213024:*:*:*:node.js:*:*",
"matchCriteriaId": "9DB6D717-F4F6-44F6-A0A0-E193060C9FC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta54:*:*:*:node.js:*:*",
"matchCriteriaId": "5A8BFEC9-E3E6-42ED-BAB4-FAB207B12967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta55:*:*:*:node.js:*:*",
"matchCriteriaId": "7D968542-39B4-44AB-A187-12E59221F502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta56:*:*:*:node.js:*:*",
"matchCriteriaId": "4DDE1FEF-94FB-47DD-997C-974F405E3985",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta57:*:*:*:node.js:*:*",
"matchCriteriaId": "9806C512-748D-4384-BC50-C28C3F3FF5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta58:*:*:*:node.js:*:*",
"matchCriteriaId": "BC5AB7C3-87F8-4E05-9310-637B6A3CD70F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from \"use server\" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing functions, because browsers send SameSite=Lax cookies on top-level GET requests. This affected all server functions -- both serverAction() handlers and bare exported functions in \"use server\" files. This vulnerability is fixed in 1.0.6."
}
],
"id": "CVE-2026-39371",
"lastModified": "2026-04-24T18:14:13.430",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-04-07T20:16:31.980",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/redwoodjs/sdk/security/advisories/GHSA-x8rx-789c-2pxq"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…