Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61686: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in remix-run react-router

0
Critical
VulnerabilityCVE-2025-61686cvecve-2025-61686cwe-22
Published: Sat Jan 10 2026 (01/10/2026, 02:41:22 UTC)
Source: CVE Database V5
Vendor/Project: remix-run
Product: react-router

Description

React Router is a router for React. In @react-router/node versions 7.0.0 through 7.9.3, @remix-run/deno prior to version 2.17.2, and @remix-run/node prior to version 2.17.2, if createFileSessionStorage() is being used from @react-router/node (or @remix-run/node/@remix-run/deno in Remix v2) with an unsigned cookie, it is possible for an attacker to cause the session to try to read/write from a location outside the specified session file directory. The success of the attack would depend on the permissions of the web server process to access those files. Read files cannot be returned directly to the attacker. Session file reads would only succeed if the file matched the expected session file format. If the file matched the session file format, the data would be populated into the server side session but not directly returned to the attacker unless the application logic returned specific session information. This issue has been patched in @react-router/node version 7.9.4, @remix-run/deno version 2.17.2, and @remix-run/node version 2.17.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:33:55 UTC

Technical Analysis

CVE-2025-61686 is a critical path traversal vulnerability (CWE-22) found in the React Router and Remix Run frameworks, specifically in versions @react-router/node 7.0.0 through 7.9.3, @remix-run/deno prior to 2.17.2, and @remix-run/node prior to 2.17.2. The vulnerability occurs when the createFileSessionStorage() function is used with unsigned cookies, allowing an attacker to manipulate the pathname used for session file storage. This manipulation enables the session mechanism to read from or write to files outside the designated session directory. The attack's success depends on the file system permissions granted to the web server process. Although direct file content disclosure to the attacker is not possible, if the targeted file matches the expected session file format, its data can be loaded into the server-side session. This could lead to unauthorized modification of session state or influence application logic if the application exposes session data. The vulnerability requires no privileges or user interaction, making it highly exploitable remotely. The issue was addressed by patches released in @react-router/node 7.9.4 and @remix-run/deno and @remix-run/node 2.17.2. No known exploits are reported in the wild as of now.

Potential Impact

The vulnerability poses a significant risk to organizations using affected versions of React Router and Remix Run frameworks, especially those relying on file-based session storage with unsigned cookies. Successful exploitation can lead to unauthorized modification of session data, potentially allowing attackers to escalate privileges, bypass authentication, or manipulate application state. Although direct file disclosure is limited, the ability to write outside the intended directory can facilitate further attacks, such as injecting malicious session data or corrupting session files, potentially causing denial of service or enabling further compromise. Given the widespread use of React Router and Remix Run in modern web applications, this vulnerability could impact a broad range of industries including technology, finance, healthcare, and e-commerce. The lack of required authentication and user interaction increases the risk of automated exploitation attempts. Organizations failing to patch may face data integrity issues, service disruptions, and reputational damage.

Mitigation Recommendations

Organizations should immediately upgrade to patched versions: @react-router/node 7.9.4 or later, and @remix-run/deno and @remix-run/node 2.17.2 or later. Review and audit session management configurations to avoid using unsigned cookies with file-based session storage. Implement strict file system permissions to limit the web server process's access only to necessary directories, minimizing the impact of potential path traversal. Employ input validation and sanitization to ensure session file paths cannot be manipulated by user input. Consider migrating to alternative session storage mechanisms that do not rely on file system paths, such as in-memory or database-backed stores. Monitor application logs for unusual session file access patterns or errors indicating path traversal attempts. Conduct penetration testing focused on session management and path traversal vectors to verify mitigation effectiveness. Maintain an incident response plan to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-09-29T20:25:16.182Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961c40f19784dcf52ace864

Added to database: 1/10/2026, 3:14:23 AM

Last enriched: 3/4/2026, 6:33:55 PM

Last updated: 3/24/2026, 2:48:20 PM

Views: 3377

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses