PT-2025-44571 · Remix Run · React Router
Published
2025-10-30
·
Updated
2026-01-13
·
CVE-2025-61686
CVSS v3.1
9.1
9.1
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
React Router versions 7.0.0 through 7.9.3
@remix-run/deno versions prior to 2.17.2
@remix-run/node versions prior to 2.17.2
Description
The software contains a flaw in the
createFileSessionStorage() function when used with unsigned cookies. This allows attackers to manipulate session cookies to perform directory traversal, potentially enabling read and write access to files outside the intended session file directory. The success of an attack depends on the web server process's permissions. While read files cannot be directly returned to the attacker, session file reads may succeed if the file matches the expected session file format, potentially populating the server-side session with data.Recommendations
React Router versions 7.0.0 through 7.9.3: Upgrade to version 7.9.4 or later.
@remix-run/deno versions prior to 2.17.2: Upgrade to version 2.17.2 or later.
@remix-run/node versions prior to 2.17.2: Upgrade to version 2.17.2 or later.
Fix
DoS
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-61686
Affected Products
React Router
References · 17
- https://nvd.nist.gov/vuln/detail/CVE-2025-61686 · Security Note
- https://github.com/remix-run/react-router/security/advisories/GHSA-9583-h5hc-x8cw⭐ 56101 🔗 10811 · Note
- https://twitter.com/pulsepatchio/status/2009634245849841763 · Twitter Post
- https://twitter.com/0dayPublishing/status/2009825261873762611 · Twitter Post
- https://twitter.com/ThreatSynop/status/2010691431304708538 · Twitter Post
- https://twitter.com/ActiveITSolutns/status/2010711515255439850 · Twitter Post
- https://twitter.com/CCBalert/status/2010801651557306719 · Twitter Post
- https://twitter.com/PurpleOps_io/status/2010744115848184320 · Twitter Post
- https://twitter.com/CVEnew/status/2009837432267485327 · Twitter Post
- https://t.me/pentestingnews/72253 · Telegram Post
- https://twitter.com/dailytechonx/status/2010772016987558124 · Twitter Post
- https://twitter.com/ThreatSynop/status/2010668334656737694 · Twitter Post
- https://twitter.com/Karma_X_Inc/status/2011005993543418279 · Twitter Post
- https://twitter.com/mercuryheavens/status/1984013425723457568 · Twitter Post
- https://twitter.com/VulmonFeeds/status/2009920475464380582 · Twitter Post