{"uuid": "435ffc74-a581-48fb-9496-9d2d8a3e98a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43865", "type": "seen", "source": "https://t.me/cvedetector/23722", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43865 - React Router HTTP Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43865 \nPublished : April 25, 2025, 1:15 a.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : React Router is a router for React. In versions on the 7.0 branch prior to version 7.5.2, it's possible to modify pre-rendered data by adding a header to the request. This allows to completely spoof its contents and modify all the values \u200b\u200bof the data object passed to the HTML. This issue has been patched in version 7.5.2. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T04:58:32.000000Z"}