CVE-2025-68470: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in remix-run react-router
React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), <Link>, or redirect(), the app performs a navigation/redirect to an external URL. This is only an issue if you are passing untrusted content into navigation paths in your application code. This issue has been patched in versions 6.30.2 and 7.9.6.
AI Analysis
Technical Summary
CVE-2025-68470 is a security vulnerability classified as CWE-601 (Open Redirect) found in the React Router library, a popular routing solution for React-based web applications. The flaw exists in versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, where an attacker can supply a crafted path that causes the application to redirect users to an external, untrusted URL. This happens when the application uses React Router's navigation methods such as navigate(), <Link>, or redirect() with untrusted or unsanitized input. The vulnerability arises because the router does not properly validate or restrict the destination URLs, allowing attackers to exploit this to redirect users to malicious sites, potentially facilitating phishing attacks, credential theft, or malware distribution. Exploitation requires that the application developer passes untrusted content into navigation paths, so it is a security risk primarily due to improper input handling in the application code rather than a flaw that can be exploited blindly. The vulnerability has been patched in React Router versions 6.30.2 and 7.9.6. The CVSS 3.1 base score is 6.5, indicating a medium severity with network attack vector, low attack complexity, requiring privileges (likely developer or admin privileges to inject untrusted paths), no user interaction, and impact limited to integrity (due to redirecting users to unintended URLs). No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability can lead to significant security risks if exploited. Web applications using vulnerable React Router versions that improperly handle user input in navigation paths may redirect users to malicious external sites controlled by attackers. This can facilitate phishing campaigns targeting employees or customers, potentially leading to credential compromise, unauthorized access, or malware infections. The integrity of user navigation is compromised, undermining trust in affected applications. While the vulnerability does not directly impact confidentiality or availability, the indirect consequences of successful phishing or malware delivery can be severe. Organizations in sectors with high reliance on web applications, such as finance, e-commerce, and government services, are particularly at risk. The requirement for passing untrusted input means that secure coding practices can mitigate risk, but legacy or poorly maintained applications remain vulnerable. The lack of known exploits reduces immediate risk, but the medium severity score and widespread use of React Router in European web development environments warrant prompt remediation.
Mitigation Recommendations
European organizations should immediately audit their web applications to identify usage of React Router versions between 6.0.0 and 6.30.1 or 7.0.0 and 7.9.5. Upgrading to patched versions 6.30.2 or 7.9.6 is the primary and most effective mitigation. Additionally, developers must ensure that all navigation paths and URLs passed to React Router's navigation functions are properly validated and sanitized to reject or neutralize untrusted input. Implement strict input validation policies, employing allowlists for URLs or path segments where feasible. Employ Content Security Policy (CSP) headers to restrict the domains to which the browser can navigate or load resources, reducing the impact of potential redirects. Conduct security code reviews focusing on navigation logic and user input handling. Educate developers about the risks of open redirects and secure coding practices. Monitor web traffic for unusual redirect patterns and implement user awareness training to recognize phishing attempts that may leverage this vulnerability. Finally, maintain an inventory of third-party libraries and ensure timely patching of dependencies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Ireland
CVE-2025-68470: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in remix-run react-router
Description
React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), <Link>, or redirect(), the app performs a navigation/redirect to an external URL. This is only an issue if you are passing untrusted content into navigation paths in your application code. This issue has been patched in versions 6.30.2 and 7.9.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-68470 is a security vulnerability classified as CWE-601 (Open Redirect) found in the React Router library, a popular routing solution for React-based web applications. The flaw exists in versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, where an attacker can supply a crafted path that causes the application to redirect users to an external, untrusted URL. This happens when the application uses React Router's navigation methods such as navigate(), <Link>, or redirect() with untrusted or unsanitized input. The vulnerability arises because the router does not properly validate or restrict the destination URLs, allowing attackers to exploit this to redirect users to malicious sites, potentially facilitating phishing attacks, credential theft, or malware distribution. Exploitation requires that the application developer passes untrusted content into navigation paths, so it is a security risk primarily due to improper input handling in the application code rather than a flaw that can be exploited blindly. The vulnerability has been patched in React Router versions 6.30.2 and 7.9.6. The CVSS 3.1 base score is 6.5, indicating a medium severity with network attack vector, low attack complexity, requiring privileges (likely developer or admin privileges to inject untrusted paths), no user interaction, and impact limited to integrity (due to redirecting users to unintended URLs). No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability can lead to significant security risks if exploited. Web applications using vulnerable React Router versions that improperly handle user input in navigation paths may redirect users to malicious external sites controlled by attackers. This can facilitate phishing campaigns targeting employees or customers, potentially leading to credential compromise, unauthorized access, or malware infections. The integrity of user navigation is compromised, undermining trust in affected applications. While the vulnerability does not directly impact confidentiality or availability, the indirect consequences of successful phishing or malware delivery can be severe. Organizations in sectors with high reliance on web applications, such as finance, e-commerce, and government services, are particularly at risk. The requirement for passing untrusted input means that secure coding practices can mitigate risk, but legacy or poorly maintained applications remain vulnerable. The lack of known exploits reduces immediate risk, but the medium severity score and widespread use of React Router in European web development environments warrant prompt remediation.
Mitigation Recommendations
European organizations should immediately audit their web applications to identify usage of React Router versions between 6.0.0 and 6.30.1 or 7.0.0 and 7.9.5. Upgrading to patched versions 6.30.2 or 7.9.6 is the primary and most effective mitigation. Additionally, developers must ensure that all navigation paths and URLs passed to React Router's navigation functions are properly validated and sanitized to reject or neutralize untrusted input. Implement strict input validation policies, employing allowlists for URLs or path segments where feasible. Employ Content Security Policy (CSP) headers to restrict the domains to which the browser can navigate or load resources, reducing the impact of potential redirects. Conduct security code reviews focusing on navigation logic and user input handling. Educate developers about the risks of open redirects and secure coding practices. Monitor web traffic for unusual redirect patterns and implement user awareness training to recognize phishing attempts that may leverage this vulnerability. Finally, maintain an inventory of third-party libraries and ensure timely patching of dependencies.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-18T13:48:59.555Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961c40f19784dcf52ace867
Added to database: 1/10/2026, 3:14:23 AM
Last enriched: 1/17/2026, 7:50:52 AM
Last updated: 2/6/2026, 12:56:13 PM
Views: 211
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumLiving off the AI: The Next Evolution of Attacker Tradecraft
MediumFlickr Security Incident Tied to Third-Party Email System
MediumCVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.