Moderate severityOSV Advisory· Published Jan 10, 2026· Updated Jan 12, 2026
React Router has CSRF issue in Action/Server Action Request Processing
CVE-2026-22030
Description
React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route action handlers in Framework Mode, or when using React Server Actions in the new unstable RSC modes. There is no impact if Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>) is being used. This issue has been patched in @remix-run/server-runtime version 2.17.3 and react-router version 7.12.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
react-routernpm | >= 7.0.0, < 7.12.0 | 7.12.0 |
@remix-run/server-runtimenpm | < 2.17.3 | 2.17.3 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-h5cw-625j-3rxhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-22030ghsaADVISORY
- github.com/remix-run/react-router/security/advisories/GHSA-h5cw-625j-3rxhghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.