Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68470: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in remix-run react-router

0
Medium
VulnerabilityCVE-2025-68470cvecve-2025-68470cwe-601
Published: Sat Jan 10 2026 (01/10/2026, 02:39:41 UTC)
Source: CVE Database V5
Vendor/Project: remix-run
Product: react-router

Description

React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), <Link>, or redirect(), the app performs a navigation/redirect to an external URL. This is only an issue if you are passing untrusted content into navigation paths in your application code. This issue has been patched in versions 6.30.2 and 7.9.6.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:50:52 UTC

Technical Analysis

CVE-2025-68470 is a security vulnerability classified as CWE-601 (Open Redirect) found in the React Router library, a popular routing solution for React-based web applications. The flaw exists in versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, where an attacker can supply a crafted path that causes the application to redirect users to an external, untrusted URL. This happens when the application uses React Router's navigation methods such as navigate(), <Link>, or redirect() with untrusted or unsanitized input. The vulnerability arises because the router does not properly validate or restrict the destination URLs, allowing attackers to exploit this to redirect users to malicious sites, potentially facilitating phishing attacks, credential theft, or malware distribution. Exploitation requires that the application developer passes untrusted content into navigation paths, so it is a security risk primarily due to improper input handling in the application code rather than a flaw that can be exploited blindly. The vulnerability has been patched in React Router versions 6.30.2 and 7.9.6. The CVSS 3.1 base score is 6.5, indicating a medium severity with network attack vector, low attack complexity, requiring privileges (likely developer or admin privileges to inject untrusted paths), no user interaction, and impact limited to integrity (due to redirecting users to unintended URLs). No known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, this vulnerability can lead to significant security risks if exploited. Web applications using vulnerable React Router versions that improperly handle user input in navigation paths may redirect users to malicious external sites controlled by attackers. This can facilitate phishing campaigns targeting employees or customers, potentially leading to credential compromise, unauthorized access, or malware infections. The integrity of user navigation is compromised, undermining trust in affected applications. While the vulnerability does not directly impact confidentiality or availability, the indirect consequences of successful phishing or malware delivery can be severe. Organizations in sectors with high reliance on web applications, such as finance, e-commerce, and government services, are particularly at risk. The requirement for passing untrusted input means that secure coding practices can mitigate risk, but legacy or poorly maintained applications remain vulnerable. The lack of known exploits reduces immediate risk, but the medium severity score and widespread use of React Router in European web development environments warrant prompt remediation.

Mitigation Recommendations

European organizations should immediately audit their web applications to identify usage of React Router versions between 6.0.0 and 6.30.1 or 7.0.0 and 7.9.5. Upgrading to patched versions 6.30.2 or 7.9.6 is the primary and most effective mitigation. Additionally, developers must ensure that all navigation paths and URLs passed to React Router's navigation functions are properly validated and sanitized to reject or neutralize untrusted input. Implement strict input validation policies, employing allowlists for URLs or path segments where feasible. Employ Content Security Policy (CSP) headers to restrict the domains to which the browser can navigate or load resources, reducing the impact of potential redirects. Conduct security code reviews focusing on navigation logic and user input handling. Educate developers about the risks of open redirects and secure coding practices. Monitor web traffic for unusual redirect patterns and implement user awareness training to recognize phishing attempts that may leverage this vulnerability. Finally, maintain an inventory of third-party libraries and ensure timely patching of dependencies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-18T13:48:59.555Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961c40f19784dcf52ace867

Added to database: 1/10/2026, 3:14:23 AM

Last enriched: 1/17/2026, 7:50:52 AM

Last updated: 2/6/2026, 12:56:13 PM

Views: 211

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats