First published: Tue Apr 01 2025(Updated: )
### Impact We received a report about a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming `Request` by putting a URL pathname in the port section of a URL that is part of a `Host` or `X-Forwarded-Host` header sent to a Remix/React Router request handler. ### Patches This issue has been patched and released in Remix 2.16.3 React Router 7.4.1. ### Credits - Rachid Allam (zhero;) - Yasser Allam (inzo_)
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@remix-run/express | >=2.11.1<2.16.3 | 2.16.3 |
npm/@react-router/express | >=7.0.0<7.4.1 | 7.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-4q56-crqp-v477 is classified as high due to the potential for URL spoofing in incoming requests.
To fix GHSA-4q56-crqp-v477, update to @remix-run/express version 2.16.3 or @react-router/express version 7.4.1.
GHSA-4q56-crqp-v477 affects all Remix 2 versions from 2.11.1 to 2.16.3 and all React Router 7 versions from 7.0.0 to 7.4.1.
GHSA-4q56-crqp-v477 is a URL spoofing vulnerability that impacts the Express adapter in Remix and React Router.
Anyone using the Express adapter with Remix 2 or React Router 7 is potentially affected by GHSA-4q56-crqp-v477.