React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sat, 26 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | threat_severity 
 | 
Fri, 25 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 25 Apr 2025 00:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2. | |
| Title | React Router allows a DoS via cache poisoning by forcing SPA mode | |
| Weaknesses | CWE-755 | |
| References |  | 
 | 
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-04-25T00:18:16.058Z
Updated: 2025-04-25T15:18:38.495Z
Reserved: 2025-04-17T20:07:08.556Z
Link: CVE-2025-43864
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-04-25T15:18:07.430Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-04-25T01:15:43.117
Modified: 2025-04-29T13:52:28.490
Link: CVE-2025-43864
 Redhat
                        Redhat