Alert IDs:
- 3362a43a-833f-4d37-b4bf-3563126d958c
- 36265441-012e-4f28-bba4-0636cc4f6adf
- 3a937653-b36c-4845-b7a7-14b6967a754b
- 41fbf3a9-de00-4171-bc55-b3447c0acdc6
- 50ad172f-26a0-41b2-8a50-dc6adcc0f044
- 55694e65-ca5c-467a-b625-46c412bf0812
- 5d5b3e17-37ad-4f39-8e8a-72a257f934b2
- 637691de-6d7d-4e04-a095-a1abb4e9759e
- 6652f491-cec0-495e-9c3a-0b8bc7cea9b2
- 6acd6e7b-ff52-402d-abf5-8285a54d932e
- 877614e1-49f0-4180-94d1-5ddadb5a6e1b
- 8c45614d-c47a-4a41-99c8-bacd338f5590
- 8c6e0288-4f25-4e7f-9b2f-171965f90edd
- 937a4ec2-5a98-4e2f-bcce-e3877d3c08f6
- 9b62585d-a942-4256-9ebe-2c94e6802c02
- a56ff11c-2272-42c2-93a7-4192919ec2ce
- b3bf1f9b-8e19-44e1-9ca8-db954bfdb1ac
- c048523c-0dad-4241-8c5a-f9c4d30a6fc0
- d51e6757-0bd9-43a2-a42a-49e75be55e1e
- d8521b1e-a27f-4f2d-9cdb-014e239869cf
- de122f66-b971-4961-88bd-8a636acc8b6c
- e2ec1273-ae1a-4fc4-aa34-9c3568f5765d
- e3b5d085-98f6-4039-a17e-4d162b064dae
- e7241289-89c5-46e0-9b3f-1bff37bed690
- f58ee4f4-5124-42b2-84bd-b6a20ec18771
Vulnerabilities in axios
Release: May21st rel
Total Vulnerabilities: 25
Severity: HIGH (Score: 7.5)
Description:
Withdrawn Advisory
This advisory has been withdrawn because users of Axios 1.10.0 have the flexibility to use a patched version of form-data, the software in which the vulnerability originates, without upgrading Axios to address GHSA-fjxv-7rqg-78g4.
Original Description
A critical vulnerability exists in the form-data package used by axios@1.10.0. The issue allows an attacker to predict multipart boundary values generated using Math.random(), opening the door to HTTP parameter pollution or injection attacks.
This was submitted in issue #6969 and addressed in pull request #6970.
Details
The vulnerable package form-data@4.0.0 is used by axios@1.10.0 as a transitive dependency. It uses non-secure, deterministic randomness (Math.random()) to generate multipart boundary strings.
This flaw is tracked under Snyk Advisory SNYK-JS-FORMDATA-10841150 and CVE-2025-7783.
Affected form-data versions:
- <2.5.4
-
=3.0.0 <3.0.4
-
=4.0.0 <4.0.4
Since axios@1.10.0 pulls in form-data@4.0.0, it is exposed to this issue.
PoC
- Install Axios: -
npm install axios@1.10.0
2.Run snyk test:
Tested 104 dependencies for known issues, found 1 issue, 1 vulnerable path.
✗ Predictable Value Range from Previous Values [Critical Severity]
in form-data@4.0.0 via axios@1.10.0 > form-data@4.0.0
- Trigger a multipart/form-data request. Observe the boundary header uses predictable random values, which could be exploited in a targeted environment.
Impact
- Vulnerability Type: Predictable Value / HTTP Parameter Pollution
- Risk: Critical (CVSS 9.4)
- Impacted Users: Any application using axios@1.10.0 to submit multipart form-data
This could potentially allow attackers to:
- Interfere with multipart request parsing
- Inject unintended parameters
- Exploit backend deserialization logic depending on content boundaries
Related Links
GitHub Issue #6969
Pull Request #xxxx (replace with actual link)
Snyk Advisory
form-data on npm
Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-54371
Alert ID: 3362a43a-833f-4d37-b4bf-3563126d958c
Severity: MEDIUM (Score: 4.8)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, for stream request bodies, maxBodyLength is bypassed when maxRedirects is set to 0 (native http/https transport path). Oversized streamed uploads are sent fully even when the caller sets strict body limits. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42034
Alert ID: 36265441-012e-4f28-bba4-0636cc4f6adf
Severity: HIGH (Score: 0.0)
Description:
axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-39338
Alert ID: 3a937653-b36c-4845-b7a7-14b6967a754b
Severity: HIGH (Score: 4.0)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42043
Alert ID: 41fbf3a9-de00-4171-bc55-b3447c0acdc6
Severity: MEDIUM (Score: 4.2)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution to silently suppress all HTTP error responses (401, 403, 500, etc.), causing them to be treated as successful responses. This completely bypasses application-level authentication and error handling. The root cause is that validateStatus is the only config property using the mergeDirectKeys merge strategy, which uses JavaScript's in operator — an operator that inherently traverses the prototype chain. When Object.prototype.validateStatus is polluted with () => true, all HTTP status codes are accepted as success. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42041
Alert ID: 50ad172f-26a0-41b2-8a50-dc6adcc0f044
Severity: HIGH (Score: 5.9)
Description:
axios is vulnerable to Inefficient Regular Expression Complexity
Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-3749
Alert ID: 55694e65-ca5c-467a-b625-46c412bf0812
Severity: MEDIUM (Score: 5.3)
Description:
Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.1, the FormDataPart constructor in lib/helpers/formDataToStream.js interpolates value.type directly into the Content-Type header of each multipart part without sanitizing CRLF (\r\n) sequences. An attacker who controls the .type property of a Blob/File-like object (e.g., via a user-uploaded file in a Node.js proxy service) can inject arbitrary MIME part headers into the multipart form-data body. This bypasses Node.js v18+ built-in header protections because the injection targets the multipart body structure, not HTTP request headers. This vulnerability is fixed in 1.15.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42037
Alert ID: 5d5b3e17-37ad-4f39-8e8a-72a257f934b2
Severity: MEDIUM (Score: 4.2)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Versions prior to 1.15.0 and 0.3.1 are vulnerable to a specific gadget-style attack chain in which prototype pollution in a third-party dependency may be leveraged to inject unsanitized header values into outbound requests. This vulnerability is fixed in 1.15.0 and 0.3.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-40175
Alert ID: 637691de-6d7d-4e04-a095-a1abb4e9759e
Severity: MEDIUM (Score: 5.3)
Description:
An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-45857
Alert ID: 6652f491-cec0-495e-9c3a-0b8bc7cea9b2
Severity: MEDIUM (Score: 4.7)
Description:
Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2020-28168
Alert ID: 6acd6e7b-ff52-402d-abf5-8285a54d932e
Severity: HIGH (Score: 7.5)
Description:
Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2019-10742
Alert ID: 877614e1-49f0-4180-94d1-5ddadb5a6e1b
Severity: HIGH (Score: 7.4)
Description:
Axios is a promise based HTTP client for the browser and Node.js. From version 1.0.0 to before version 1.15.2, fFive config properties (auth, baseURL, socketPath, beforeRedirect, and insecureHTTPParser) in the HTTP adapter are read via direct property access without hasOwnProperty guards, making them exploitable as prototype pollution gadgets. When Object.prototype is polluted by another dependency in the same process, axios silently picks up these polluted values on every outbound HTTP request. This issue has been patched in version 1.15.2.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42264
Alert ID: 8c45614d-c47a-4a41-99c8-bacd338f5590
Severity: HIGH (Score: 5.5)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when Object.prototype has been polluted by any co-dependency with keys that axios reads without a hasOwnProperty guard, an attacker can (a) silently intercept and modify every JSON response before the application sees it, or (b) fully hijack the underlying HTTP transport, gaining access to request credentials, headers, and body. The precondition is prototype pollution from a separate source in the same process. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42033
Alert ID: 8c6e0288-4f25-4e7f-9b2f-171965f90edd
Severity: LOW (Score: 3.6)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the encode() function in lib/helpers/AxiosURLSearchParams.js contains a character mapping (charMap) at line 21 that reverses the safe percent-encoding of null bytes. After encodeURIComponent('\x00') correctly produces the safe sequence %00, the charMap entry '%00': '\x00' converts it back to a raw null byte. Primary impact is limited because the standard axios request flow is not affected. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42040
Alert ID: 937a4ec2-5a98-4e2f-bcce-e3877d3c08f6
Severity: HIGH (Score: 0.0)
Description:
axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-27152
Alert ID: 9b62585d-a942-4256-9ebe-2c94e6802c02
Severity: MEDIUM (Score: 5.9)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Starting in version 1.13.0 and prior to 1.13.2, Axios HTTP/2 session cleanup logic contains a state corruption bug that allows a malicious server to crash the client process through concurrent session closures. The vulnerability exists in the Http2Sessions.getSession() method in lib/adapters/http.js. The session cleanup logic contains a control flow error when removing sessions from the sessions array. This vulnerability is fixed in 1.13.2.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-39865
Alert ID: a56ff11c-2272-42c2-93a7-4192919ec2ce
Severity: MEDIUM (Score: 6.5)
Description:
Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.2, he Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution in the application's dependency tree to be escalated into surgical, invisible modification of all JSON API responses — including privilege escalation, balance manipulation, and authorization bypass. The default transformResponse function at lib/defaults/index.js:124 calls JSON.parse(data, this.parseReviver), where this is the merged config object. Because parseReviver is not present in Axios defaults, not validated by assertOptions, and not subject to any constraints, a polluted Object.prototype.parseReviver function is called for every key-value pair in every JSON response, allowing the attacker to selectively modify individual values while leaving the rest of the response intact. This vulnerability is fixed in 1.15.2.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42044
Alert ID: b3bf1f9b-8e19-44e1-9ca8-db954bfdb1ac
Severity: HIGH (Score: 7.5)
Description:
Axios is a promise based HTTP client for the browser and Node.js. When Axios starting in version 0.28.0 and prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the data: scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (Buffer/Blob) and returns a synthetic 200 response. This path ignores maxContentLength / maxBodyLength (which only protect HTTP responses), so an attacker can supply a very large data: URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested responseType: 'stream'. Versions 0.30.2 and 1.12.0 contain a patch for the issue.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-58754
Alert ID: c048523c-0dad-4241-8c5a-f9c4d30a6fc0
Severity: HIGH (Score: 5.5)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, a prototype pollution gadget exists in the Axios HTTP adapter (lib/adapters/http.js) that allows an attacker to inject arbitrary HTTP headers into outgoing requests. The vulnerability exploits duck-type checking of the data payload, where if Object.prototype is polluted with getHeaders, append, pipe, on, once, and Symbol.toStringTag, Axios misidentifies any plain object payload as a FormData instance and calls the attacker-controlled getHeaders() function, merging the returned headers into the outgoing request. The vulnerable code resides exclusively in lib/adapters/http.js. The prototype pollution source does not need to originate from Axios itself — any prototype pollution primitive in any dependency in the application's dependency tree is sufficient to trigger this gadget. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42035
Alert ID: d51e6757-0bd9-43a2-a42a-49e75be55e1e
Severity: MEDIUM (Score: 4.2)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.31.0, Axios does not correctly handle hostname normalization when checking NO_PROXY rules. Requests to loopback addresses like localhost. (with a trailing dot) or [::1] (IPv6 literal) skip NO_PROXY matching and go through the configured proxy. This goes against what developers expect and lets attackers force requests through a proxy, even if NO_PROXY is set up to protect loopback or internal services. This issue leads to the possibility of proxy bypass and SSRF vulnerabilities allowing attackers to reach sensitive loopback or internal services despite the configured protections. This vulnerability is fixed in 1.15.0 and 0.31.0.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-62718
Alert ID: d8521b1e-a27f-4f2d-9cdb-014e239869cf
Severity: MEDIUM (Score: 4.8)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when responseType: 'stream' is used, Axios returns the response stream without enforcing maxContentLength. This bypasses configured response-size limits and allows unbounded downstream consumption. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42036
Alert ID: de122f66-b971-4961-88bd-8a636acc8b6c
Severity: HIGH (Score: 5.9)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to versions 0.30.3 and 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing proto as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in versions 0.30.3 and 1.13.5.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-25639
Alert ID: e2ec1273-ae1a-4fc4-aa34-9c3568f5765d
Severity: MEDIUM (Score: 4.8)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library's XSRF token protection logic uses JavaScript truthy/falsy semantics instead of strict boolean comparison for the withXSRFToken config property. When this property is set to any truthy non-boolean value (via prototype pollution or misconfiguration), the same-origin check (isURLSameOrigin) is short-circuited, causing XSRF tokens to be sent to all request targets including cross-origin servers controlled by an attacker. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42042
Alert ID: e3b5d085-98f6-4039-a17e-4d162b064dae
Severity: MEDIUM (Score: 3.4)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, he fix for no_proxy hostname normalization bypass is incomplete. When no_proxy=localhost is set, requests to 127.0.0.1 and [::1] still route through the proxy instead of bypassing it. The shouldBypassProxy() function does pure string matching — it does not resolve IP aliases or loopback equivalents. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42038
Alert ID: e7241289-89c5-46e0-9b3f-1bff37bed690
Severity: MEDIUM (Score: 5.9)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42039
Alert ID: f58ee4f4-5124-42b2-84bd-b6a20ec18771
Alert IDs:
Vulnerabilities in axios
Release: May21st rel
Total Vulnerabilities: 25
1. CVE-2025-54371
Severity: HIGH (Score: 7.5)
Description:
Withdrawn Advisory
This advisory has been withdrawn because users of Axios 1.10.0 have the flexibility to use a patched version of form-data, the software in which the vulnerability originates, without upgrading Axios to address GHSA-fjxv-7rqg-78g4.
Original Description
A critical vulnerability exists in the form-data package used by
axios@1.10.0. The issue allows an attacker to predict multipart boundary values generated usingMath.random(), opening the door to HTTP parameter pollution or injection attacks.This was submitted in issue #6969 and addressed in pull request #6970.
Details
The vulnerable package
form-data@4.0.0is used byaxios@1.10.0as a transitive dependency. It uses non-secure, deterministic randomness (Math.random()) to generate multipart boundary strings.This flaw is tracked under Snyk Advisory SNYK-JS-FORMDATA-10841150 and CVE-2025-7783.
Affected
form-dataversions:Since
axios@1.10.0pulls inform-data@4.0.0, it is exposed to this issue.PoC
npm install axios@1.10.02.Run
snyk test:Impact
This could potentially allow attackers to:
Related Links
GitHub Issue #6969
Pull Request #xxxx (replace with actual link)
Snyk Advisory
form-data on npm
Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-54371
Alert ID: 3362a43a-833f-4d37-b4bf-3563126d958c
2. CVE-2026-42034
Severity: MEDIUM (Score: 4.8)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, for stream request bodies, maxBodyLength is bypassed when maxRedirects is set to 0 (native http/https transport path). Oversized streamed uploads are sent fully even when the caller sets strict body limits. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42034
Alert ID: 36265441-012e-4f28-bba4-0636cc4f6adf
3. CVE-2024-39338
Severity: HIGH (Score: 0.0)
Description:
axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-39338
Alert ID: 3a937653-b36c-4845-b7a7-14b6967a754b
4. CVE-2026-42043
Severity: HIGH (Score: 4.0)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42043
Alert ID: 41fbf3a9-de00-4171-bc55-b3447c0acdc6
5. CVE-2026-42041
Severity: MEDIUM (Score: 4.2)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution to silently suppress all HTTP error responses (401, 403, 500, etc.), causing them to be treated as successful responses. This completely bypasses application-level authentication and error handling. The root cause is that validateStatus is the only config property using the mergeDirectKeys merge strategy, which uses JavaScript's in operator — an operator that inherently traverses the prototype chain. When Object.prototype.validateStatus is polluted with () => true, all HTTP status codes are accepted as success. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42041
Alert ID: 50ad172f-26a0-41b2-8a50-dc6adcc0f044
6. CVE-2021-3749
Severity: HIGH (Score: 5.9)
Description:
axios is vulnerable to Inefficient Regular Expression Complexity
Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-3749
Alert ID: 55694e65-ca5c-467a-b625-46c412bf0812
7. CVE-2026-42037
Severity: MEDIUM (Score: 5.3)
Description:
Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.1, the FormDataPart constructor in lib/helpers/formDataToStream.js interpolates value.type directly into the Content-Type header of each multipart part without sanitizing CRLF (\r\n) sequences. An attacker who controls the .type property of a Blob/File-like object (e.g., via a user-uploaded file in a Node.js proxy service) can inject arbitrary MIME part headers into the multipart form-data body. This bypasses Node.js v18+ built-in header protections because the injection targets the multipart body structure, not HTTP request headers. This vulnerability is fixed in 1.15.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42037
Alert ID: 5d5b3e17-37ad-4f39-8e8a-72a257f934b2
8. CVE-2026-40175
Severity: MEDIUM (Score: 4.2)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Versions prior to 1.15.0 and 0.3.1 are vulnerable to a specific gadget-style attack chain in which prototype pollution in a third-party dependency may be leveraged to inject unsanitized header values into outbound requests. This vulnerability is fixed in 1.15.0 and 0.3.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-40175
Alert ID: 637691de-6d7d-4e04-a095-a1abb4e9759e
9. CVE-2023-45857
Severity: MEDIUM (Score: 5.3)
Description:
An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-45857
Alert ID: 6652f491-cec0-495e-9c3a-0b8bc7cea9b2
10. CVE-2020-28168
Severity: MEDIUM (Score: 4.7)
Description:
Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2020-28168
Alert ID: 6acd6e7b-ff52-402d-abf5-8285a54d932e
11. CVE-2019-10742
Severity: HIGH (Score: 7.5)
Description:
Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2019-10742
Alert ID: 877614e1-49f0-4180-94d1-5ddadb5a6e1b
12. CVE-2026-42264
Severity: HIGH (Score: 7.4)
Description:
Axios is a promise based HTTP client for the browser and Node.js. From version 1.0.0 to before version 1.15.2, fFive config properties (auth, baseURL, socketPath, beforeRedirect, and insecureHTTPParser) in the HTTP adapter are read via direct property access without hasOwnProperty guards, making them exploitable as prototype pollution gadgets. When Object.prototype is polluted by another dependency in the same process, axios silently picks up these polluted values on every outbound HTTP request. This issue has been patched in version 1.15.2.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42264
Alert ID: 8c45614d-c47a-4a41-99c8-bacd338f5590
13. CVE-2026-42033
Severity: HIGH (Score: 5.5)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when Object.prototype has been polluted by any co-dependency with keys that axios reads without a hasOwnProperty guard, an attacker can (a) silently intercept and modify every JSON response before the application sees it, or (b) fully hijack the underlying HTTP transport, gaining access to request credentials, headers, and body. The precondition is prototype pollution from a separate source in the same process. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42033
Alert ID: 8c6e0288-4f25-4e7f-9b2f-171965f90edd
14. CVE-2026-42040
Severity: LOW (Score: 3.6)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the encode() function in lib/helpers/AxiosURLSearchParams.js contains a character mapping (charMap) at line 21 that reverses the safe percent-encoding of null bytes. After encodeURIComponent('\x00') correctly produces the safe sequence %00, the charMap entry '%00': '\x00' converts it back to a raw null byte. Primary impact is limited because the standard axios request flow is not affected. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42040
Alert ID: 937a4ec2-5a98-4e2f-bcce-e3877d3c08f6
15. CVE-2025-27152
Severity: HIGH (Score: 0.0)
Description:
axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-27152
Alert ID: 9b62585d-a942-4256-9ebe-2c94e6802c02
16. CVE-2026-39865
Severity: MEDIUM (Score: 5.9)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Starting in version 1.13.0 and prior to 1.13.2, Axios HTTP/2 session cleanup logic contains a state corruption bug that allows a malicious server to crash the client process through concurrent session closures. The vulnerability exists in the Http2Sessions.getSession() method in lib/adapters/http.js. The session cleanup logic contains a control flow error when removing sessions from the sessions array. This vulnerability is fixed in 1.13.2.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-39865
Alert ID: a56ff11c-2272-42c2-93a7-4192919ec2ce
17. CVE-2026-42044
Severity: MEDIUM (Score: 6.5)
Description:
Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.2, he Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution in the application's dependency tree to be escalated into surgical, invisible modification of all JSON API responses — including privilege escalation, balance manipulation, and authorization bypass. The default transformResponse function at lib/defaults/index.js:124 calls JSON.parse(data, this.parseReviver), where this is the merged config object. Because parseReviver is not present in Axios defaults, not validated by assertOptions, and not subject to any constraints, a polluted Object.prototype.parseReviver function is called for every key-value pair in every JSON response, allowing the attacker to selectively modify individual values while leaving the rest of the response intact. This vulnerability is fixed in 1.15.2.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42044
Alert ID: b3bf1f9b-8e19-44e1-9ca8-db954bfdb1ac
18. CVE-2025-58754
Severity: HIGH (Score: 7.5)
Description:
Axios is a promise based HTTP client for the browser and Node.js. When Axios starting in version 0.28.0 and prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the
data:scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (Buffer/Blob) and returns a synthetic 200 response. This path ignoresmaxContentLength/maxBodyLength(which only protect HTTP responses), so an attacker can supply a very largedata:URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requestedresponseType: 'stream'. Versions 0.30.2 and 1.12.0 contain a patch for the issue.Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-58754
Alert ID: c048523c-0dad-4241-8c5a-f9c4d30a6fc0
19. CVE-2026-42035
Severity: HIGH (Score: 5.5)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, a prototype pollution gadget exists in the Axios HTTP adapter (lib/adapters/http.js) that allows an attacker to inject arbitrary HTTP headers into outgoing requests. The vulnerability exploits duck-type checking of the data payload, where if Object.prototype is polluted with getHeaders, append, pipe, on, once, and Symbol.toStringTag, Axios misidentifies any plain object payload as a FormData instance and calls the attacker-controlled getHeaders() function, merging the returned headers into the outgoing request. The vulnerable code resides exclusively in lib/adapters/http.js. The prototype pollution source does not need to originate from Axios itself — any prototype pollution primitive in any dependency in the application's dependency tree is sufficient to trigger this gadget. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42035
Alert ID: d51e6757-0bd9-43a2-a42a-49e75be55e1e
20. CVE-2025-62718
Severity: MEDIUM (Score: 4.2)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.31.0, Axios does not correctly handle hostname normalization when checking NO_PROXY rules. Requests to loopback addresses like localhost. (with a trailing dot) or [::1] (IPv6 literal) skip NO_PROXY matching and go through the configured proxy. This goes against what developers expect and lets attackers force requests through a proxy, even if NO_PROXY is set up to protect loopback or internal services. This issue leads to the possibility of proxy bypass and SSRF vulnerabilities allowing attackers to reach sensitive loopback or internal services despite the configured protections. This vulnerability is fixed in 1.15.0 and 0.31.0.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-62718
Alert ID: d8521b1e-a27f-4f2d-9cdb-014e239869cf
21. CVE-2026-42036
Severity: MEDIUM (Score: 4.8)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when responseType: 'stream' is used, Axios returns the response stream without enforcing maxContentLength. This bypasses configured response-size limits and allows unbounded downstream consumption. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42036
Alert ID: de122f66-b971-4961-88bd-8a636acc8b6c
22. CVE-2026-25639
Severity: HIGH (Score: 5.9)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to versions 0.30.3 and 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing proto as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in versions 0.30.3 and 1.13.5.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-25639
Alert ID: e2ec1273-ae1a-4fc4-aa34-9c3568f5765d
23. CVE-2026-42042
Severity: MEDIUM (Score: 4.8)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library's XSRF token protection logic uses JavaScript truthy/falsy semantics instead of strict boolean comparison for the withXSRFToken config property. When this property is set to any truthy non-boolean value (via prototype pollution or misconfiguration), the same-origin check (isURLSameOrigin) is short-circuited, causing XSRF tokens to be sent to all request targets including cross-origin servers controlled by an attacker. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42042
Alert ID: e3b5d085-98f6-4039-a17e-4d162b064dae
24. CVE-2026-42038
Severity: MEDIUM (Score: 3.4)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, he fix for no_proxy hostname normalization bypass is incomplete. When no_proxy=localhost is set, requests to 127.0.0.1 and [::1] still route through the proxy instead of bypassing it. The shouldBypassProxy() function does pure string matching — it does not resolve IP aliases or loopback equivalents. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42038
Alert ID: e7241289-89c5-46e0-9b3f-1bff37bed690
25. CVE-2026-42039
Severity: MEDIUM (Score: 5.9)
Description:
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-42039
Alert ID: f58ee4f4-5124-42b2-84bd-b6a20ec18771