CVE-2025-68470
Unknown Unknown - Not Provided
Open Redirect Vulnerability in React Router Navigation Paths

Publication date: 2026-01-10

Last updated on: 2026-01-10

Assigner: GitHub, Inc.

Description
React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), <Link>, or redirect(), the app performs a navigation/redirect to an external URL. This is only an issue if you are passing untrusted content into navigation paths in your application code. This issue has been patched in versions 6.30.2 and 7.9.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-10
Last Modified
2026-01-10
Generated
2026-05-07
AI Q&A
2026-01-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
remix-run react-router From 6.0.0 (inc) to 6.30.1 (inc)
remix-run react-router From 7.0.0 (inc) to 7.9.5 (inc)
remix-run react-router From 6.30.2 (inc)
remix-run react-router From 7.9.6 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in React Router versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5 allows an attacker to craft a malicious path that, when used in navigation methods like navigate(), <Link>, or redirect(), causes the application to redirect to an external URL unexpectedly. It occurs only if untrusted input is passed into navigation paths in the application code. This can lead to unauthorized modification of navigation behavior. [1]


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker to cause your React Router application to redirect users to external URLs without authorization. This can lead to integrity issues in your application's navigation flow, potentially exposing users to phishing or malicious sites. The attack requires low privileges and no user interaction, making it relatively easy to exploit if untrusted input is used in navigation paths. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves identifying if your React Router application is using vulnerable versions (6.0.0 through 6.30.1 or 7.0.0 through 7.9.5) and if untrusted input is passed into navigation paths. You can check the installed react-router version with the command: npm list react-router. Additionally, review your application code for usage of navigate(), <Link>, or redirect() methods that accept user-controlled input. Network detection of exploit attempts may require monitoring for unexpected external URL redirects triggered by crafted paths, but no specific commands are provided. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade react-router to a patched version: at least 6.30.2 if using version 6.x, or at least 7.9.6 if using version 7.x. Additionally, ensure that your application does not pass untrusted or user-controlled input directly into navigation paths used by navigate(), <Link>, or redirect() methods. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart