New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system
Description
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been identified in React Router, a widely-used routing library for React applications. This flaw could allow an unauthenticated attacker to bypass security controls and access sensitive files on the web server, potentially exposing confidential data, application source code, and system configuration files. Organizations are urged to apply the necessary security updates immediately to mitigate the risk of data compromise.
Vulnerability Details
CVE-ID: CVE-2025-59057
Affected Software: React Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is a path traversal flaw within the React Router library, specifically affecting applications that utilize server-side rendering (SSR). An attacker can exploit this by sending a specially crafted URL containing directory traversal sequences (e.g.,
../). Due to improper input sanitization in the routing component, the server-side rendering process can be manipulated to resolve a file path outside of the intended web root directory, granting the attacker read access to arbitrary files on the server's file system.Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.6. Successful exploitation could lead to significant business impact, including the exposure of sensitive corporate data, customer information, intellectual property, and infrastructure credentials stored on the server. The compromise of such data could result in severe reputational damage, financial loss, and potential regulatory fines for non-compliance with data protection standards. Furthermore, the information gained could be used by attackers to facilitate more complex, chained attacks against the organization's infrastructure.
Remediation Plan
Immediate Action: Apply vendor security updates immediately. System administrators should use their package managers (e.g., npm, yarn) to update React Router and its related dependencies to the patched versions as specified in the vendor's security advisory. After patching, it is crucial to monitor for any signs of exploitation attempts by reviewing web server access logs and application logs for anomalous requests.
Proactive Monitoring: Security teams should configure monitoring systems to detect and alert on potential exploitation attempts. This includes searching web server access logs for URL patterns containing path traversal sequences like
../,..%2f,%2e%2e/, and other encoded variations. Monitor for unusual file access patterns on the server, especially from the web server process, and check for unexpected outbound network traffic which could indicate data exfiltration.Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls to reduce the risk. Deploy a Web Application Firewall (WAF) with rules specifically configured to block directory traversal attack patterns in incoming HTTP requests. Additionally, enforce the principle of least privilege by ensuring the web server's user account has strict, read-only access limited exclusively to the directories required for the application to function.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 11, 2026, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the widespread use of React Router in modern web applications and the high severity of the flaw, it is highly probable that threat actors will develop exploits in the near future.
Analyst Recommendation
Given the high severity (CVSS 7.6) of this vulnerability and its potential for sensitive data exposure, we strongly recommend that organizations prioritize the immediate application of vendor-supplied security patches to all affected systems. Internet-facing applications utilizing React Router with server-side rendering are at the highest risk and should be addressed first. While this CVE is not currently on the CISA KEV list, indicating no evidence of widespread exploitation, its public disclosure makes it a prime target for opportunistic attackers. Proactive patching is the most effective defense against potential compromise.