Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59057: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in remix-run react-router

0
High
VulnerabilityCVE-2025-59057cvecve-2025-59057cwe-79
Published: Sat Jan 10 2026 (01/10/2026, 02:40:25 UTC)
Source: CVE Database V5
Vendor/Project: remix-run
Product: react-router

Description

React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. and react-router versions 7.0.0 through 7.8.2, a XSS vulnerability exists in in React Router's meta()/<Meta> APIs in Framework Mode when generating script:ld+json tags which could allow arbitrary JavaScript execution during SSR if untrusted content is used to generate the tag. There is no impact if the application is being used in Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>). This issue has been patched in @remix-run/react version 2.17.1 and react-router version 7.9.0.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:51:27 UTC

Technical Analysis

CVE-2025-59057 is a cross-site scripting (XSS) vulnerability classified under CWE-79 that affects specific versions of the React Router library, a widely used routing solution for React applications. The vulnerability arises in the meta() and <Meta> APIs when operating in Framework Mode, specifically during server-side rendering (SSR) where script:ld+json tags are generated. These tags are intended to embed structured data in JSON-LD format for SEO and rich snippets. However, if untrusted or unsanitized input is incorporated into these tags, the improper neutralization of input allows an attacker to inject arbitrary JavaScript code. This injected script executes in the context of the victim's browser, potentially leading to theft of sensitive information such as cookies, tokens, or other session data, and could facilitate further attacks like account takeover or privilege escalation. The vulnerability does not affect applications using Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>), which handle routing differently and do not generate these vulnerable script tags. The flaw has been patched in @remix-run/react version 2.17.1 and react-router version 7.9.0. The CVSS v3.1 score is 7.6 (high), reflecting network attack vector, low attack complexity, requiring privileges and user interaction, with high confidentiality impact but limited integrity and no availability impact. No public exploits are currently known, but the widespread use of React Router in web applications makes this a significant risk if unpatched.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those deploying React applications using server-side rendering with the affected versions of React Router in Framework Mode. Exploitation can lead to client-side code execution, enabling attackers to steal sensitive user data such as authentication tokens, personal information, or perform actions on behalf of users. This can result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial losses. Industries with high reliance on web applications, such as finance, e-commerce, healthcare, and government services, are particularly vulnerable. The attack vector being remote and network-based increases the threat surface, especially for public-facing applications. Although exploitation requires some privileges and user interaction, the impact on confidentiality is high, which is critical for protecting user privacy and trust. The lack of availability impact means service disruption is unlikely, but data integrity and confidentiality risks remain substantial.

Mitigation Recommendations

European organizations should immediately audit their React applications to identify usage of @remix-run/react versions between 1.15.0 and 2.17.0 or react-router versions between 7.0.0 and 7.8.2, particularly those using Framework Mode with meta() or <Meta> APIs generating script:ld+json tags. The primary mitigation is to upgrade to @remix-run/react version 2.17.1 or later, or react-router version 7.9.0 or later, where the vulnerability is patched. Additionally, developers should ensure that any data used to generate script:ld+json tags is strictly sanitized and validated to prevent injection of untrusted content. Implement Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of potential XSS. Conduct thorough code reviews focusing on SSR data handling and consider adopting Declarative or Data Mode routing where feasible, as these modes are not affected. Monitoring application logs for unusual script injection attempts and user behavior anomalies can help detect exploitation attempts early. Finally, educate development teams about secure coding practices related to SSR and JSON-LD generation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.173Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961c40f19784dcf52ace861

Added to database: 1/10/2026, 3:14:23 AM

Last enriched: 1/17/2026, 7:51:27 AM

Last updated: 2/5/2026, 10:28:44 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats