GHSA-4q56-crqp-v477

Suggest an improvement
Source
https://github.com/advisories/GHSA-4q56-crqp-v477
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-4q56-crqp-v477/GHSA-4q56-crqp-v477.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4q56-crqp-v477
Aliases
  • CVE-2025-31137
Published
2025-04-01T22:23:33Z
Modified
2025-04-01T22:42:10.697503Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Remix and React Router allow URL manipulation via Host / X-Forwarded-Host headers
Details

Impact

We received a report about a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request by putting a URL pathname in the port section of a URL that is part of a Host or X-Forwarded-Host header sent to a Remix/React Router request handler.

Patches

This issue has been patched and released in Remix 2.16.3 React Router 7.4.1.

Credits

  • Rachid Allam (zhero;)
  • Yasser Allam (inzo_)
Database specific
{
    "nvd_published_at": "2025-04-01T19:15:45Z",
    "cwe_ids": [
        "CWE-444"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-04-01T22:23:33Z"
}
References

Affected packages

npm / @react-router/express

Package

Name
@react-router/express
View open source insights on deps.dev
Purl
pkg:npm/%40react-router/express

Affected ranges

Type
SEMVER
Events
Introduced
7.0.0
Fixed
7.4.1

npm / @remix-run/express

Package

Name
@remix-run/express
View open source insights on deps.dev
Purl
pkg:npm/%40remix-run/express

Affected ranges

Type
SEMVER
Events
Introduced
2.11.1
Fixed
2.16.3