RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing functions, because browsers send SameSite=Lax cookies on top-level GET requests. This affected all server functions -- both serverAction() handlers and bare exported functions in "use server" files. This vulnerability is fixed in 1.0.6.
References
| Link | Resource |
|---|---|
| https://github.com/redwoodjs/sdk/security/advisories/GHSA-x8rx-789c-2pxq | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Apr 2026, 18:14
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Rwsdk
Rwsdk redwoodsdk |
|
| References | () https://github.com/redwoodjs/sdk/security/advisories/GHSA-x8rx-789c-2pxq - Vendor Advisory | |
| CPE | cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta51:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:*:*:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta55:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta52:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta53:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta58:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta57:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta50:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta53_test20260205213024:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta56:*:*:*:node.js:*:* cpe:2.3:a:rwsdk:redwoodsdk:1.0.0:beta54:*:*:*:node.js:*:* |
07 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 20:16
Updated : 2026-04-24 18:14
NVD link : CVE-2026-39371
Mitre link : CVE-2026-39371
CVE.ORG link : CVE-2026-39371
JSON object : View
Products Affected
rwsdk
- redwoodsdk
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
