FKIE_CVE-2025-68470
Vulnerability from fkie_nvd - Published: 2026-01-10 03:15 - Updated: 2026-01-30 18:20
Severity ?
Summary
React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), <Link>, or redirect(), the app performs a navigation/redirect to an external URL. This is only an issue if you are passing untrusted content into navigation paths in your application code. This issue has been patched in versions 6.30.2 and 7.9.6.
References
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/remix-run/react-router/security/advisories/GHSA-9jcx-v3wj-wh4m | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| shopify | react-router | * | |
| shopify | react-router | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:shopify:react-router:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "FFF65931-3D66-4739-BFC7-9632E04CFBD6",
"versionEndIncluding": "6.30.1",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:shopify:react-router:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "7460DDBE-CAD6-4AD1-A8CF-334FBB977ABE",
"versionEndIncluding": "7.9.5",
"versionStartIncluding": "7.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), \u003cLink\u003e, or redirect(), the app performs a navigation/redirect to an external URL. This is only an issue if you are passing untrusted content into navigation paths in your application code. This issue has been patched in versions 6.30.2 and 7.9.6."
},
{
"lang": "es",
"value": "React Router es un router para React. En las versiones 6.0.0 a 6.30.1 y 7.0.0 a 7.9.5, una ruta proporcionada por un atacante puede ser dise\u00f1ada de modo que cuando una aplicaci\u00f3n de React Router navega a ella a trav\u00e9s de navigate(), , o redirect(), la aplicaci\u00f3n realiza una navegaci\u00f3n/redirecci\u00f3n a una URL externa. Esto es solo un problema si est\u00e1 pasando contenido no confiable a rutas de navegaci\u00f3n en el c\u00f3digo de su aplicaci\u00f3n. Este problema ha sido parcheado en las versiones 6.30.2 y 7.9.6."
}
],
"id": "CVE-2025-68470",
"lastModified": "2026-01-30T18:20:54.873",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-01-10T03:15:48.477",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-9jcx-v3wj-wh4m"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…