Bug 2362232 (CVE-2025-43864) - CVE-2025-43864 react-router: React Router allows a DoS via cache poisoning by forcing SPA mode
Summary: CVE-2025-43864 react-router: React Router allows a DoS via cache poisoning by...
Keywords:
Status: NEW
Alias: CVE-2025-43864
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-04-25 01:01 UTC by OSIDB Bzimport
Modified: 2025-06-01 08:27 UTC (History)
145 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-04-25 01:01:08 UTC
React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2.


Note You need to log in before you can comment on or make changes to this bug.