
Both vulnerabilities specifically target applications using React Router in Framework mode and primarily affect routes that implement loaders, according to security advisories published by researchers Rachid Allam (zhero) and Yasser Allam (inzo_) from the security research group cold-try.
The first vulnerability (CVE-2025-43864) allows attackers to force an application to switch to Single-Page Application (SPA) mode by simply adding the X-React-Router-SPA-Mode header to HTTP requests. When applications using Server-Side Rendering (SSR) are forced into SPA mode, they generate errors that completely corrupt the page rendering.

The second vulnerability (CVE-2025-43865) involves a header called X-React-Router-Prerender-Data that can be exploited to manipulate pre-rendered data. Attackers can first access a page's data by appending ".data" to the route URL, retrieve the data structure, modify its values, and then send requests with the altered data via the vulnerable header.

Both vulnerabilities received high severity ratings, with CVSS scores of 7.5 and 8.2, respectively, reflecting their network attack vector, low complexity, and significant impact on application availability and integrity.
React Router's maintainers have addressed these security issues in version 7.5.2. Organizations using affected versions are strongly advised to update immediately to mitigate these risks.
The discovery highlights the importance of careful header validation in web frameworks and the potential security implications of features that alter application behavior based on HTTP headers, especially in applications that implement caching mechanisms.