Bug 2428423 (CVE-2025-61686) - CVE-2025-61686 react-router: React Router has Path Traversal in File Session Storage
Summary: CVE-2025-61686 react-router: React Router has Path Traversal in File Session ...
Keywords:
Status: NEW
Alias: CVE-2025-61686
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2428678
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-10 04:02 UTC by OSIDB Bzimport
Modified: 2026-01-12 18:32 UTC (History)
157 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2026-01-12 14:50:17 UTC
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-10 04:02:22 UTC
React Router is a router for React. In @react-router/node versions 7.0.0 through 7.9.3, @remix-run/deno prior to version 2.17.2, and @remix-run/node prior to version 2.17.2, if createFileSessionStorage() is being used from @react-router/node (or @remix-run/node/@remix-run/deno in Remix v2) with an unsigned cookie, it is possible for an attacker to cause the session to try to read/write from a location outside the specified session file directory. The success of the attack would depend on the permissions of the web server process to access those files. Read files cannot be returned directly to the attacker. Session file reads would only succeed if the file matched the expected session file format. If the file matched the session file format, the data would be populated into the server side session but not directly returned to the attacker unless the application logic returned specific session information. This issue has been patched in @react-router/node version 7.9.4, @remix-run/deno version 2.17.2, and @remix-run/node version 2.17.2.

Comment 2 David Hanina 2026-01-12 13:49:38 UTC
In case of the FreeIPA WebUI this CVE, as well as few other react-router related, do not concern us, as we do not use react-router on the server-side, the CVE is not relevant for client-side only code.


Note You need to log in before you can comment on or make changes to this bug.