CVE-2025-59057: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in remix-run react-router
React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. and react-router versions 7.0.0 through 7.8.2, a XSS vulnerability exists in in React Router's meta()/<Meta> APIs in Framework Mode when generating script:ld+json tags which could allow arbitrary JavaScript execution during SSR if untrusted content is used to generate the tag. There is no impact if the application is being used in Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>). This issue has been patched in @remix-run/react version 2.17.1 and react-router version 7.9.0.
AI Analysis
Technical Summary
CVE-2025-59057 is a cross-site scripting (XSS) vulnerability classified under CWE-79 that affects specific versions of the React Router library, a widely used routing solution for React applications. The vulnerability arises in the meta() and <Meta> APIs when operating in Framework Mode, specifically during server-side rendering (SSR) where script:ld+json tags are generated. These tags are intended to embed structured data in JSON-LD format for SEO and rich snippets. However, if untrusted or unsanitized input is incorporated into these tags, the improper neutralization of input allows an attacker to inject arbitrary JavaScript code. This injected script executes in the context of the victim's browser, potentially leading to theft of sensitive information such as cookies, tokens, or other session data, and could facilitate further attacks like account takeover or privilege escalation. The vulnerability does not affect applications using Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>), which handle routing differently and do not generate these vulnerable script tags. The flaw has been patched in @remix-run/react version 2.17.1 and react-router version 7.9.0. The CVSS v3.1 score is 7.6 (high), reflecting network attack vector, low attack complexity, requiring privileges and user interaction, with high confidentiality impact but limited integrity and no availability impact. No public exploits are currently known, but the widespread use of React Router in web applications makes this a significant risk if unpatched.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those deploying React applications using server-side rendering with the affected versions of React Router in Framework Mode. Exploitation can lead to client-side code execution, enabling attackers to steal sensitive user data such as authentication tokens, personal information, or perform actions on behalf of users. This can result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial losses. Industries with high reliance on web applications, such as finance, e-commerce, healthcare, and government services, are particularly vulnerable. The attack vector being remote and network-based increases the threat surface, especially for public-facing applications. Although exploitation requires some privileges and user interaction, the impact on confidentiality is high, which is critical for protecting user privacy and trust. The lack of availability impact means service disruption is unlikely, but data integrity and confidentiality risks remain substantial.
Mitigation Recommendations
European organizations should immediately audit their React applications to identify usage of @remix-run/react versions between 1.15.0 and 2.17.0 or react-router versions between 7.0.0 and 7.8.2, particularly those using Framework Mode with meta() or <Meta> APIs generating script:ld+json tags. The primary mitigation is to upgrade to @remix-run/react version 2.17.1 or later, or react-router version 7.9.0 or later, where the vulnerability is patched. Additionally, developers should ensure that any data used to generate script:ld+json tags is strictly sanitized and validated to prevent injection of untrusted content. Implement Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of potential XSS. Conduct thorough code reviews focusing on SSR data handling and consider adopting Declarative or Data Mode routing where feasible, as these modes are not affected. Monitoring application logs for unusual script injection attempts and user behavior anomalies can help detect exploitation attempts early. Finally, educate development teams about secure coding practices related to SSR and JSON-LD generation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-59057: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in remix-run react-router
Description
React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. and react-router versions 7.0.0 through 7.8.2, a XSS vulnerability exists in in React Router's meta()/<Meta> APIs in Framework Mode when generating script:ld+json tags which could allow arbitrary JavaScript execution during SSR if untrusted content is used to generate the tag. There is no impact if the application is being used in Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>). This issue has been patched in @remix-run/react version 2.17.1 and react-router version 7.9.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-59057 is a cross-site scripting (XSS) vulnerability classified under CWE-79 that affects specific versions of the React Router library, a widely used routing solution for React applications. The vulnerability arises in the meta() and <Meta> APIs when operating in Framework Mode, specifically during server-side rendering (SSR) where script:ld+json tags are generated. These tags are intended to embed structured data in JSON-LD format for SEO and rich snippets. However, if untrusted or unsanitized input is incorporated into these tags, the improper neutralization of input allows an attacker to inject arbitrary JavaScript code. This injected script executes in the context of the victim's browser, potentially leading to theft of sensitive information such as cookies, tokens, or other session data, and could facilitate further attacks like account takeover or privilege escalation. The vulnerability does not affect applications using Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>), which handle routing differently and do not generate these vulnerable script tags. The flaw has been patched in @remix-run/react version 2.17.1 and react-router version 7.9.0. The CVSS v3.1 score is 7.6 (high), reflecting network attack vector, low attack complexity, requiring privileges and user interaction, with high confidentiality impact but limited integrity and no availability impact. No public exploits are currently known, but the widespread use of React Router in web applications makes this a significant risk if unpatched.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those deploying React applications using server-side rendering with the affected versions of React Router in Framework Mode. Exploitation can lead to client-side code execution, enabling attackers to steal sensitive user data such as authentication tokens, personal information, or perform actions on behalf of users. This can result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial losses. Industries with high reliance on web applications, such as finance, e-commerce, healthcare, and government services, are particularly vulnerable. The attack vector being remote and network-based increases the threat surface, especially for public-facing applications. Although exploitation requires some privileges and user interaction, the impact on confidentiality is high, which is critical for protecting user privacy and trust. The lack of availability impact means service disruption is unlikely, but data integrity and confidentiality risks remain substantial.
Mitigation Recommendations
European organizations should immediately audit their React applications to identify usage of @remix-run/react versions between 1.15.0 and 2.17.0 or react-router versions between 7.0.0 and 7.8.2, particularly those using Framework Mode with meta() or <Meta> APIs generating script:ld+json tags. The primary mitigation is to upgrade to @remix-run/react version 2.17.1 or later, or react-router version 7.9.0 or later, where the vulnerability is patched. Additionally, developers should ensure that any data used to generate script:ld+json tags is strictly sanitized and validated to prevent injection of untrusted content. Implement Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of potential XSS. Conduct thorough code reviews focusing on SSR data handling and consider adopting Declarative or Data Mode routing where feasible, as these modes are not affected. Monitoring application logs for unusual script injection attempts and user behavior anomalies can help detect exploitation attempts early. Finally, educate development teams about secure coding practices related to SSR and JSON-LD generation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-08T16:19:26.173Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961c40f19784dcf52ace861
Added to database: 1/10/2026, 3:14:23 AM
Last enriched: 1/17/2026, 7:51:27 AM
Last updated: 2/5/2026, 10:28:44 PM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1970: Open Redirect in Edimax BR-6258n
MediumCVE-2026-1964: Improper Access Controls in WeKan
MediumCVE-2026-25815: CWE-1394 Use of Default Cryptographic Key in Fortinet FortiOS
LowCVE-2026-1963: Improper Access Controls in WeKan
MediumCVE-2025-15551: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in TP-Link Systems Inc. Archer MR200 v5.2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.