Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22030: CWE-346: Origin Validation Error in remix-run react-router

0
Medium
VulnerabilityCVE-2026-22030cvecve-2026-22030cwe-346cwe-352
Published: Sat Jan 10 2026 (01/10/2026, 02:42:44 UTC)
Source: CVE Database V5
Vendor/Project: remix-run
Product: react-router

Description

React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route action handlers in Framework Mode, or when using React Server Actions in the new unstable RSC modes. There is no impact if Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>) is being used. This issue has been patched in @remix-run/server-runtime version 2.17.3 and react-router version 7.12.0.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:51:41 UTC

Technical Analysis

CVE-2026-22030 is a vulnerability classified under CWE-346 (Origin Validation Error) and CWE-352 (Cross-Site Request Forgery) affecting the React Router library and the @remix-run/server-runtime package. React Router is a widely used routing library for React applications, facilitating navigation and UI state management. The vulnerability arises from improper origin validation on document POST requests to UI routes when server-side route action handlers are used in Framework Mode or when React Server Actions are employed in the new unstable React Server Components (RSC) modes. This flaw allows an attacker to craft malicious web pages that can trick authenticated users into submitting forged POST requests to the vulnerable application, potentially causing unauthorized state changes or actions without the user's consent. Importantly, the vulnerability does not impact applications using Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>), which perform proper origin validation. The vulnerability is exploitable remotely without requiring authentication but does require user interaction (e.g., visiting a malicious site). The CVSS v3.1 base score is 6.5, reflecting medium severity due to the lack of confidentiality impact but high integrity impact. The issue was patched in react-router version 7.12.0 and @remix-run/server-runtime 2.17.3. No known exploits have been reported in the wild, but the widespread use of React Router in modern web applications makes this a significant concern for developers and organizations relying on these libraries for routing and server-side actions.

Potential Impact

For European organizations, the impact of CVE-2026-22030 can be significant, especially for those developing or deploying React-based web applications using vulnerable versions of react-router or @remix-run/server-runtime in Framework Mode or unstable RSC modes. Successful exploitation could lead to unauthorized state changes, such as modifying user data, performing unintended transactions, or altering application behavior without user consent. This undermines data integrity and could result in reputational damage, regulatory non-compliance (e.g., GDPR violations if personal data is affected), and potential financial losses. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure users into triggering the CSRF attack. The lack of confidentiality impact reduces the risk of data leakage, but the integrity compromise remains critical for applications handling sensitive operations. European organizations with customer-facing web portals, e-commerce platforms, or internal tools using these libraries are at risk. The absence of known exploits provides a window for proactive patching and mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediate upgrade to react-router version 7.12.0 or later and @remix-run/server-runtime version 2.17.3 or later to apply the official patches addressing the origin validation issue. 2. Review application routing configurations to avoid using Framework Mode or unstable React Server Components modes if possible, or ensure that origin validation is properly enforced. 3. Implement additional CSRF protections at the application level, such as anti-CSRF tokens, SameSite cookies, and strict CORS policies to reduce attack surface. 4. Educate developers on secure usage patterns of React Router and Remix frameworks, emphasizing the security implications of different routing modes. 5. Conduct thorough security testing, including penetration testing and code reviews focused on CSRF and origin validation mechanisms. 6. Monitor user activity and logs for unusual POST requests or patterns indicative of CSRF attempts. 7. For organizations unable to immediately patch, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting UI routes. 8. Maintain awareness of updates from the remix-run project and community advisories for any further developments or exploit reports.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T22:30:38.718Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961c40f19784dcf52ace870

Added to database: 1/10/2026, 3:14:23 AM

Last enriched: 1/17/2026, 7:51:41 AM

Last updated: 2/6/2026, 7:01:21 AM

Views: 182

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats