We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-43864

React Router allows a DoS via cache poisoning by forcing SPA mode



Description

React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2.

Reserved 2025-04-17 | Published 2025-04-25 | Updated 2025-04-25 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-755: Improper Handling of Exceptional Conditions

Product status

>= 7.2.0, < 7.5.2
affected

References

github.com/...router/security/advisories/GHSA-f46r-rw29-r322

github.com/...ommit/c84302972a152d851cf5dd859ff332b354b70111

github.com/...ages/react-router/lib/server-runtime/server.ts

cve.org (CVE-2025-43864)

nvd.nist.gov (CVE-2025-43864)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-43864

Support options

Helpdesk Chat, Email, Knowledgebase