Bug 2428414 (CVE-2026-22030) - CVE-2026-22030 react-router: React Router CSRF in Action/Server Action Request Processing
Summary: CVE-2026-22030 react-router: React Router CSRF in Action/Server Action Reques...
Keywords:
Status: NEW
Alias: CVE-2026-22030
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2428763
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-10 04:01 UTC by OSIDB Bzimport
Modified: 2026-01-12 20:24 UTC (History)
155 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-10 04:01:39 UTC
React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route action handlers in Framework Mode, or when using React Server Actions in the new unstable RSC modes. There is no impact if Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>) is being used. This issue has been patched in @remix-run/server-runtime version 2.17.3 and react-router version 7.12.0.


Note You need to log in before you can comment on or make changes to this bug.