Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @remix-run/server-runtime
  4. ›
  5. CVE-2026-22030

CVE-2026-22030: React Router has CSRF issue in Action/Server Action Request Processing

January 8, 2026 (updated January 11, 2026)

React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route action handlers in Framework Mode, or when using React Server Actions in the new unstable RSC modes.

[!NOTE] This does not impact applications that use Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>).

References

  • github.com/advisories/GHSA-h5cw-625j-3rxh
  • github.com/remix-run/react-router
  • github.com/remix-run/react-router/security/advisories/GHSA-h5cw-625j-3rxh
  • nvd.nist.gov/vuln/detail/CVE-2026-22030

Code Behaviors & Features

Detect and mitigate CVE-2026-22030 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.17.3

Fixed versions

  • 2.17.3

Solution

Upgrade to version 2.17.3 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-346: Origin Validation Error
  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

npm/@remix-run/server-runtime/CVE-2026-22030.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 20 Jan 2026 12:18:46 +0000.