Unknown
Multiple Products
React Router is a router for React. In @react-router/node versions 7.0.0 through 7.9.3, @remix-run/deno prior to version 2.17.2, and @remix-run/node p...
2026-01-11
Description
React Router is a router for React. In @react-router/node versions 7.0.0 through 7.9.3, @remix-run/deno prior to version 2.17.2, and @remix-run/node prior to version 2.17.2, if createFileSessionStorage() is being used from @react-router/node (or @remix-run/node/@remix-run/deno in Remix v2) with an unsigned cookie, it is possible for an attacker to cause the session to try to read/write from a location outside the specified session file directory. The success of the attack would depend on the permissions of the web server process to access those files. Read files cannot be returned directly to the attacker. Session file reads would only succeed if the file matched the expected session file format. If the file matched the session file format, the data would be populated into the server side session but not directly returned to the attacker unless the application logic returned specific session information. This issue has been patched in @react-router/node version 7.9.4, @remix-run/deno version 2.17.2, and @remix-run/node version 2.17.2.
AI Analyst Comment
Remediation
Update React Router is a router for Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been discovered in Apache Kylin that allows an attacker to force the server to make unauthorized requests to internal or external network resources. Successful exploitation of this Server-Side Request Forgery (SSRF) flaw could lead to sensitive information disclosure, internal network scanning, and the potential compromise of other systems within the organization's infrastructure.
Vulnerability Details
CVE-ID: CVE-2025-61735
Affected Software: Apache Kylin
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a Server-Side Request Forgery (SSRF). An attacker can exploit this flaw by sending a specially crafted request to a vulnerable component within the Apache Kylin application. The application fails to properly validate user-supplied input that contains a URL, allowing an attacker to trick the server into sending requests to arbitrary destinations. This can be used to scan internal networks, access internal services (such as databases or administrative interfaces), query cloud provider metadata services to steal credentials, or exfiltrate data to an attacker-controlled server.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Exploitation can have significant business consequences, including the breach of sensitive corporate or customer data stored on internal systems accessible by the Kylin server. Attackers can leverage this vulnerability to perform internal network reconnaissance, bypassing perimeter security controls like firewalls, as the malicious requests originate from a trusted internal server. In cloud-hosted environments, this flaw could lead to a full infrastructure compromise if an attacker successfully accesses and exfiltrates cloud credentials from the instance metadata service.
Remediation Plan
Immediate Action: Immediately apply the security updates provided by the Apache Software Foundation to all affected Apache Kylin instances. Prioritize patching for systems that are exposed to the internet. Following the update, review web server and application access logs for any signs of past or ongoing exploitation attempts.
Proactive Monitoring: Monitor egress network traffic from servers running Apache Kylin for any unusual or unauthorized outbound connections, especially to internal IP address ranges (e.g., 10.0.0.0/8, 192.168.0.0/16) or cloud metadata endpoints (169.254.169.254). Configure logging to record all outbound requests made by the application and audit these logs for suspicious URLs or IP addresses.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 2, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, SSRF vulnerabilities are well understood and highly valued by attackers for initial access and lateral movement. It is highly probable that functional exploits will be developed and released publicly in the near future.
Analyst Recommendation
Given the high severity (CVSS 7.3) and the potential for significant data exposure and internal network compromise, this vulnerability requires immediate attention. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, organizations should treat it with urgency. We strongly recommend that all vulnerable Apache Kylin instances be identified and patched on an emergency basis. If patching must be delayed, the compensating controls outlined above, particularly strict egress filtering, should be implemented immediately to mitigate the risk of exploitation.