Vulnerability Description
RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing functions, because browsers send SameSite=Lax cookies on top-level GET requests. This affected all server functions -- both serverAction() handlers and bare exported functions in "use server" files. This vulnerability is fixed in 1.0.6.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redwoodjs | Redwoodsdk | >= 1.0.1, < 1.0.6 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-39371?
CVE-2026-39371 is a vulnerability with a CVSS score of 8.1 (HIGH). RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In ...
How severe is CVE-2026-39371?
CVE-2026-39371 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-39371?
Check the references section above for vendor advisories and patch information. Affected products include: Redwoodjs Redwoodsdk.