Description
React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route action handlers in Framework Mode, or when using React Server Actions in the new unstable RSC modes. There is no impact if Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>) is being used. This issue has been patched in @remix-run/server-runtime version 2.17.3 and react-router version 7.12.0.
Published: 2026-01-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery that can trigger unintended server‑side actions
Action: Apply Patch
AI Analysis

Impact

React Router, when used with Remix’s server‑side route action handlers in Framework Mode or with React Server Actions in unstable RSC modes, is vulnerable to cross‑site request forgery. The flaw allows an attacker to submit forged POST requests to UI routes, triggering privileged server‑side actions without additional authentication tokens. This weakness is identified as CWE‑352 and has an additional relation to CWE‑346. The impact is the ability to perform unauthorized state changes or data manipulation on behalf of an authenticated user.

Affected Systems

Affected components include the @remix‑run/server‑runtime package versions older than 2.17.3 and react‑router package versions 7.0.0 through 7.11.0. The vulnerability does not apply when the application uses Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>). The issue is limited to Node.js running these packages, so only applications built with those stack elements are at risk.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, while the EPSS score of less than 1 % suggests a low probability of exploitation at the time of this analysis. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an attacker sending forged POST requests to the application’s UI routes, which usually requires that a user is authenticated and is tricked into visiting a malicious link or submitting a form. Under these conditions, the practical risk to most deployments remains moderate, but deployments using the vulnerable modes should patch or mitigate promptly.

Generated by OpenCVE AI on April 18, 2026 at 16:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade @remix‑run/server‑runtime to version 2.17.3 or later and react‑router to version 7.12.0 or later to apply the vendor‑provided fix.
  • If upgrading is delayed, reconfigure affected applications to operate in Declarative Mode or Data Mode, which are not susceptible to this flaw.
  • Add CSRF protection on all server‑side route actions and React Server Actions by requiring a valid CSRF token or verifying origin headers before processing POST requests.

Generated by OpenCVE AI on April 18, 2026 at 16:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h5cw-625j-3rxh React Router has CSRF issue in Action/Server Action Request Processing
History

Thu, 05 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Shopify
Shopify react-router
Shopify remix-run\/react
CPEs cpe:2.3:a:shopify:react-router:*:*:*:*:*:node.js:*:*
cpe:2.3:a:shopify:remix-run\/react:*:*:*:*:*:node.js:*:*
Vendors & Products Shopify
Shopify react-router
Shopify remix-run\/react

Tue, 13 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 12 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 10 Jan 2026 03:15:00 +0000

Type Values Removed Values Added
Description React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route action handlers in Framework Mode, or when using React Server Actions in the new unstable RSC modes. There is no impact if Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>) is being used. This issue has been patched in @remix-run/server-runtime version 2.17.3 and react-router version 7.12.0.
Title React Router has CSRF issue in Action/Server Action Request Processing
Weaknesses CWE-346
CWE-352
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}


Subscriptions

Shopify React-router Remix-run\/react
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-12T18:09:39.441Z

Reserved: 2026-01-05T22:30:38.718Z

Link: CVE-2026-22030

cve-icon Vulnrichment

Updated: 2026-01-12T18:09:36.760Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-10T03:15:49.067

Modified: 2026-02-05T20:51:29.483

Link: CVE-2026-22030

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-10T02:42:44Z

Links: CVE-2026-22030 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:45:05Z

Weaknesses