Headline
GHSA-4q56-crqp-v477: Remix and React Router allow URL manipulation via Host / X-Forwarded-Host headers
Impact
We received a report about a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request
by putting a URL pathname in the port section of a URL that is part of a Host
or X-Forwarded-Host
header sent to a Remix/React Router request handler.
Patches
This issue has been patched and released in Remix 2.16.3 React Router 7.4.1.
Credits
- Rachid Allam (zhero;)
- Yasser Allam (inzo_)
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-31137
Remix and React Router allow URL manipulation via Host / X-Forwarded-Host headers
High severity GitHub Reviewed Published Apr 1, 2025 in remix-run/react-router • Updated Apr 1, 2025
Package
npm @react-router/express (npm)
Affected versions
>= 7.0.0, < 7.4.1
npm @remix-run/express (npm)
Impact
We received a report about a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request by putting a URL pathname in the port section of a URL that is part of a Host or X-Forwarded-Host header sent to a Remix/React Router request handler.
Patches
This issue has been patched and released in Remix 2.16.3 React Router 7.4.1.
Credits
- Rachid Allam (zhero;)
- Yasser Allam (inzo_)
References
- GHSA-4q56-crqp-v477
- https://nvd.nist.gov/vuln/detail/CVE-2025-31137
Published to the GitHub Advisory Database
Apr 1, 2025