CVE-2025-61686: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in remix-run react-router
React Router is a router for React. In @react-router/node versions 7.0.0 through 7.9.3, @remix-run/deno prior to version 2.17.2, and @remix-run/node prior to version 2.17.2, if createFileSessionStorage() is being used from @react-router/node (or @remix-run/node/@remix-run/deno in Remix v2) with an unsigned cookie, it is possible for an attacker to cause the session to try to read/write from a location outside the specified session file directory. The success of the attack would depend on the permissions of the web server process to access those files. Read files cannot be returned directly to the attacker. Session file reads would only succeed if the file matched the expected session file format. If the file matched the session file format, the data would be populated into the server side session but not directly returned to the attacker unless the application logic returned specific session information. This issue has been patched in @react-router/node version 7.9.4, @remix-run/deno version 2.17.2, and @remix-run/node version 2.17.2.
AI Analysis
Technical Summary
CVE-2025-61686 is a critical path traversal vulnerability (CWE-22) found in the React Router and Remix Run frameworks, specifically in versions @react-router/node 7.0.0 through 7.9.3, @remix-run/deno prior to 2.17.2, and @remix-run/node prior to 2.17.2. The vulnerability occurs when the createFileSessionStorage() function is used with unsigned cookies, allowing an attacker to manipulate the pathname used for session file storage. This manipulation enables the session mechanism to read from or write to files outside the designated session directory. The attack's success depends on the file system permissions granted to the web server process. Although direct file content disclosure to the attacker is not possible, if the targeted file matches the expected session file format, its data can be loaded into the server-side session. This could lead to unauthorized modification of session state or influence application logic if the application exposes session data. The vulnerability requires no privileges or user interaction, making it highly exploitable remotely. The issue was addressed by patches released in @react-router/node 7.9.4 and @remix-run/deno and @remix-run/node 2.17.2. No known exploits are reported in the wild as of now.
Potential Impact
The vulnerability poses a significant risk to organizations using affected versions of React Router and Remix Run frameworks, especially those relying on file-based session storage with unsigned cookies. Successful exploitation can lead to unauthorized modification of session data, potentially allowing attackers to escalate privileges, bypass authentication, or manipulate application state. Although direct file disclosure is limited, the ability to write outside the intended directory can facilitate further attacks, such as injecting malicious session data or corrupting session files, potentially causing denial of service or enabling further compromise. Given the widespread use of React Router and Remix Run in modern web applications, this vulnerability could impact a broad range of industries including technology, finance, healthcare, and e-commerce. The lack of required authentication and user interaction increases the risk of automated exploitation attempts. Organizations failing to patch may face data integrity issues, service disruptions, and reputational damage.
Mitigation Recommendations
Organizations should immediately upgrade to patched versions: @react-router/node 7.9.4 or later, and @remix-run/deno and @remix-run/node 2.17.2 or later. Review and audit session management configurations to avoid using unsigned cookies with file-based session storage. Implement strict file system permissions to limit the web server process's access only to necessary directories, minimizing the impact of potential path traversal. Employ input validation and sanitization to ensure session file paths cannot be manipulated by user input. Consider migrating to alternative session storage mechanisms that do not rely on file system paths, such as in-memory or database-backed stores. Monitor application logs for unusual session file access patterns or errors indicating path traversal attempts. Conduct penetration testing focused on session management and path traversal vectors to verify mitigation effectiveness. Maintain an incident response plan to quickly address any exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, India, Brazil
CVE-2025-61686: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in remix-run react-router
Description
React Router is a router for React. In @react-router/node versions 7.0.0 through 7.9.3, @remix-run/deno prior to version 2.17.2, and @remix-run/node prior to version 2.17.2, if createFileSessionStorage() is being used from @react-router/node (or @remix-run/node/@remix-run/deno in Remix v2) with an unsigned cookie, it is possible for an attacker to cause the session to try to read/write from a location outside the specified session file directory. The success of the attack would depend on the permissions of the web server process to access those files. Read files cannot be returned directly to the attacker. Session file reads would only succeed if the file matched the expected session file format. If the file matched the session file format, the data would be populated into the server side session but not directly returned to the attacker unless the application logic returned specific session information. This issue has been patched in @react-router/node version 7.9.4, @remix-run/deno version 2.17.2, and @remix-run/node version 2.17.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-61686 is a critical path traversal vulnerability (CWE-22) found in the React Router and Remix Run frameworks, specifically in versions @react-router/node 7.0.0 through 7.9.3, @remix-run/deno prior to 2.17.2, and @remix-run/node prior to 2.17.2. The vulnerability occurs when the createFileSessionStorage() function is used with unsigned cookies, allowing an attacker to manipulate the pathname used for session file storage. This manipulation enables the session mechanism to read from or write to files outside the designated session directory. The attack's success depends on the file system permissions granted to the web server process. Although direct file content disclosure to the attacker is not possible, if the targeted file matches the expected session file format, its data can be loaded into the server-side session. This could lead to unauthorized modification of session state or influence application logic if the application exposes session data. The vulnerability requires no privileges or user interaction, making it highly exploitable remotely. The issue was addressed by patches released in @react-router/node 7.9.4 and @remix-run/deno and @remix-run/node 2.17.2. No known exploits are reported in the wild as of now.
Potential Impact
The vulnerability poses a significant risk to organizations using affected versions of React Router and Remix Run frameworks, especially those relying on file-based session storage with unsigned cookies. Successful exploitation can lead to unauthorized modification of session data, potentially allowing attackers to escalate privileges, bypass authentication, or manipulate application state. Although direct file disclosure is limited, the ability to write outside the intended directory can facilitate further attacks, such as injecting malicious session data or corrupting session files, potentially causing denial of service or enabling further compromise. Given the widespread use of React Router and Remix Run in modern web applications, this vulnerability could impact a broad range of industries including technology, finance, healthcare, and e-commerce. The lack of required authentication and user interaction increases the risk of automated exploitation attempts. Organizations failing to patch may face data integrity issues, service disruptions, and reputational damage.
Mitigation Recommendations
Organizations should immediately upgrade to patched versions: @react-router/node 7.9.4 or later, and @remix-run/deno and @remix-run/node 2.17.2 or later. Review and audit session management configurations to avoid using unsigned cookies with file-based session storage. Implement strict file system permissions to limit the web server process's access only to necessary directories, minimizing the impact of potential path traversal. Employ input validation and sanitization to ensure session file paths cannot be manipulated by user input. Consider migrating to alternative session storage mechanisms that do not rely on file system paths, such as in-memory or database-backed stores. Monitor application logs for unusual session file access patterns or errors indicating path traversal attempts. Conduct penetration testing focused on session management and path traversal vectors to verify mitigation effectiveness. Maintain an incident response plan to quickly address any exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-29T20:25:16.182Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961c40f19784dcf52ace864
Added to database: 1/10/2026, 3:14:23 AM
Last enriched: 3/4/2026, 6:33:55 PM
Last updated: 3/24/2026, 2:48:20 PM
Views: 3377
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.