Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22030: CWE-346: Origin Validation Error in remix-run react-router

0
Medium
VulnerabilityCVE-2026-22030cvecve-2026-22030cwe-346cwe-352
Published: Sat Jan 10 2026 (01/10/2026, 02:42:44 UTC)
Source: CVE Database V5
Vendor/Project: remix-run
Product: react-router

Description

React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route action handlers in Framework Mode, or when using React Server Actions in the new unstable RSC modes. There is no impact if Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>) is being used. This issue has been patched in @remix-run/server-runtime version 2.17.3 and react-router version 7.12.0.

AI-Powered Analysis

AILast updated: 01/10/2026, 03:30:58 UTC

Technical Analysis

This vulnerability, tracked as CVE-2026-22030, arises from improper origin validation in React Router and Remix frameworks, specifically in versions prior to 7.12.0 and 2.17.3 respectively. React Router is a widely used routing library for React applications, and Remix is a React framework that builds on it. The flaw allows attackers to perform Cross-Site Request Forgery (CSRF) attacks targeting document POST requests routed through server-side action handlers in Framework Mode or when using React Server Actions in unstable RSC modes. CSRF attacks exploit the trust a web application places in a user's browser, causing unintended actions on behalf of the user without their consent. The vulnerability is due to insufficient origin validation (CWE-346) and improper CSRF protections (CWE-352). Applications using Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>) are not affected, as these modes handle routing differently and do not expose the vulnerable server-side action handlers. The CVSS v3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact is primarily on integrity, allowing unauthorized state-changing requests. The issue was publicly disclosed on January 10, 2026, and patches are available in react-router 7.12.0 and @remix-run/server-runtime 2.17.3. No known exploits have been reported in the wild, but the vulnerability is significant for applications relying on the affected versions and modes.

Potential Impact

For European organizations, this vulnerability poses a risk to web applications built with affected versions of React Router and Remix frameworks, especially those using server-side route action handlers in Framework Mode or React Server Actions. Successful exploitation could allow attackers to perform unauthorized state-changing operations, such as modifying user data or triggering transactions, without user consent. This can lead to data integrity issues, potential financial loss, reputational damage, and regulatory non-compliance under GDPR if personal data is affected. Since React is widely adopted in Europe for web development, organizations in sectors like finance, e-commerce, healthcare, and government services that use these frameworks are at risk. The requirement for user interaction means phishing or social engineering could be used to exploit the vulnerability. The absence of impact on Declarative or Data Mode users limits the scope somewhat, but organizations using Framework Mode or unstable RSC modes must prioritize remediation. The lack of known active exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.

Mitigation Recommendations

European organizations should immediately audit their web applications to identify usage of react-router versions between 7.0.0 and 7.11.0 or @remix-run/server-runtime versions below 2.17.3. Applications using Framework Mode or React Server Actions in unstable RSC modes require urgent attention. The primary mitigation is to upgrade to react-router 7.12.0 or later and @remix-run/server-runtime 2.17.3 or later, where the vulnerability is patched. For applications that cannot upgrade immediately, implementing strict CSRF protections such as synchronizer tokens or double-submit cookies on server-side POST handlers can reduce risk. Additionally, enforcing Content Security Policy (CSP) to restrict origins and employing SameSite cookies can help mitigate CSRF risks. Developers should review routing modes and consider migrating to Declarative or Data Mode if feasible, as these are not affected. Monitoring for unusual POST requests and user activity anomalies can provide early detection. Finally, educating users about phishing risks and ensuring secure development lifecycle practices will help prevent exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T22:30:38.718Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961c40f19784dcf52ace870

Added to database: 1/10/2026, 3:14:23 AM

Last enriched: 1/10/2026, 3:30:58 AM

Last updated: 1/10/2026, 9:12:32 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats