{
  "threat_severity" : "Important",
  "public_date" : "2026-01-10T02:40:25Z",
  "bugzilla" : {
    "description" : "react-router: @remix-run/router: React Router XSS Vulnerability",
    "id" : "2428426",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2428426"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.6",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-79",
  "details" : [ "React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. and react-router versions 7.0.0 through 7.8.2, a XSS vulnerability exists in in React Router's meta()/<Meta> APIs in Framework Mode when generating script:ld+json tags which could allow arbitrary JavaScript execution during SSR if untrusted content is used to generate the tag. There is no impact if the application is being used in Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>). This issue has been patched in @remix-run/react version 2.17.1 and react-router version 7.9.0.", "The cross site scripting flaw has been discovered in the npm react-router package. A XSS vulnerability exists in in React Router's meta()/<Meta> APIs in Framework Mode when generating script:ld+json tags which could allow arbitrary JavaScript execution during SSR if untrusted content is used to generate the tag." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Ansible Automation Platform 2.6 for RHEL 9",
    "release_date" : "2026-03-06T00:00:00Z",
    "advisory" : "RHSA-2026:3958",
    "cpe" : "cpe:/a:redhat:ansible_automation_platform:2.6::el9",
    "package" : "automation-platform-ui-0:2.6.6-1.el9ap"
  }, {
    "product_name" : "Red Hat Ansible Automation Platform 2.6",
    "release_date" : "2026-03-06T00:00:00Z",
    "advisory" : "RHSA-2026:3960",
    "cpe" : "cpe:/a:redhat:ansible_automation_platform:2.6::el9",
    "package" : "ansible-automation-platform-26/gateway-rhel9:sha256:2bf86b61c2f6e9cf292ce95553a6c5b15d0d6a91f11f68095dcbc0516134ba4e"
  }, {
    "product_name" : "Red Hat OpenShift AI 2.25",
    "release_date" : "2026-03-04T00:00:00Z",
    "advisory" : "RHSA-2026:3782",
    "cpe" : "cpe:/a:redhat:openshift_ai:2.25::el9",
    "package" : "rhoai/odh-dashboard-rhel9:sha256:4e2c38590e4d912df8cd3a0d459f05908b5ed568e11d31177d8c9b7326404f3e"
  }, {
    "product_name" : "Red Hat OpenShift AI 2.25",
    "release_date" : "2026-03-04T00:00:00Z",
    "advisory" : "RHSA-2026:3782",
    "cpe" : "cpe:/a:redhat:openshift_ai:2.25::el9",
    "package" : "rhoai/odh-mod-arch-model-registry-rhel9:sha256:20c12c45a2ae97fa8d6c7e6a118312746827cb7ca38153561cb57514f9d97548"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Build of Kueue",
    "fix_state" : "Not affected",
    "package_name" : "kueue/kueue-must-gather-rhel9",
    "cpe" : "cpe:/a:redhat:kueue_operator:1"
  }, {
    "product_name" : "Red Hat Build of Kueue",
    "fix_state" : "Not affected",
    "package_name" : "kueue/kueue-operator-bundle",
    "cpe" : "cpe:/a:redhat:kueue_operator:1"
  }, {
    "product_name" : "Red Hat Build of Kueue",
    "fix_state" : "Not affected",
    "package_name" : "kueue/kueue-rhel9",
    "cpe" : "cpe:/a:redhat:kueue_operator:1"
  }, {
    "product_name" : "Red Hat Build of Kueue",
    "fix_state" : "Not affected",
    "package_name" : "kueue/kueue-rhel9-operator",
    "cpe" : "cpe:/a:redhat:kueue_operator:1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "ipa",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "ipa",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat OpenShift AI (RHOAI)",
    "fix_state" : "Affected",
    "package_name" : "rhoai/odh-mod-arch-gen-ai-rhel9",
    "cpe" : "cpe:/a:redhat:openshift_ai"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-59057\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-59057\nhttps://github.com/remix-run/react-router/security/advisories/GHSA-3cgp-3xvw-98x8" ],
  "name" : "CVE-2025-59057",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}