Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @remix-run/node
  4. ›
  5. CVE-2025-61686

CVE-2025-61686: React Router has Path Traversal in File Session Storage

January 8, 2026 (updated January 11, 2026)

If applications use createFileSessionStorage() from @react-router/node (or @remix-run/node/@remix-run/deno in Remix v2) with an unsigned cookie, it is possible for an attacker to cause the session to try to read/write from a location outside the specified session file directory. The success of the attack would depend on the permissions of the web server process to access those files.

Read files cannot be returned directly to the attacker. Session file reads would only succeed if the file matched the expected session file format. If the file matched the session file format, the data would be populated into the server side session but not directly returned to the attacker unless the application logic returned specific session information.

References

  • github.com/advisories/GHSA-9583-h5hc-x8cw
  • github.com/remix-run/react-router
  • github.com/remix-run/react-router/security/advisories/GHSA-9583-h5hc-x8cw
  • nvd.nist.gov/vuln/detail/CVE-2025-61686

Code Behaviors & Features

Detect and mitigate CVE-2025-61686 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.17.2

Fixed versions

  • 2.17.2

Solution

Upgrade to version 2.17.2 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

npm/@remix-run/node/CVE-2025-61686.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 20 Jan 2026 12:17:29 +0000.