Reversible One-Way Hash in Next.js - #VU130274
Published: May 6, 2026
Next.js
vercel
Description
The vulnerability allows a remote attacker to poison shared cache entries and cause users to receive the wrong response variant for a given URL.
The vulnerability exists due to use of a weak hash in the React Server Component cache-busting mechanism when generating the _rsc cache-busting value for shared caches with insufficient response partitioning. A remote attacker can trigger collisions in crafted requests to poison shared cache entries and cause users to receive the wrong response variant for a given URL.
Only deployments that rely on shared caches with insufficient response partitioning are vulnerable.