Skip to content

axios-1.14.1.tgz: 17 vulnerabilities (highest severity is: 9.6) #61

@mend-bolt-for-github

Description

@mend-bolt-for-github
Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (axios version) Remediation Possible**
MSC-2026-3522 Critical 9.6 detected in multiple dependencies Transitive N/A*
CVE-2026-42264 High 7.4 axios-1.14.1.tgz Direct 1.15.2
CVE-2026-42035 High 7.4 axios-1.14.1.tgz Direct 1.15.1
CVE-2026-42033 High 7.4 axios-1.14.1.tgz Direct 1.15.1
CVE-2026-42043 High 7.2 axios-1.14.1.tgz Direct 1.15.1
CVE-2025-62718 High 7.2 axios-1.14.1.tgz Direct https://github.com/axios/axios.git - v1.15.0,axios - 0.31.0,axios - 1.15.0
CVE-2026-42038 Medium 6.8 axios-1.14.1.tgz Direct 1.15.1
CVE-2026-42044 Medium 6.5 axios-1.14.1.tgz Direct 1.15.2
CVE-2026-42042 Medium 5.4 axios-1.14.1.tgz Direct 1.15.1
CVE-2026-42039 Medium 5.3 axios-1.14.1.tgz Direct 1.15.1
CVE-2026-42037 Medium 5.3 axios-1.14.1.tgz Direct 1.15.1
CVE-2026-42036 Medium 5.3 axios-1.14.1.tgz Direct 1.15.1
CVE-2026-42034 Medium 5.3 axios-1.14.1.tgz Direct 1.15.1
CVE-2026-40895 Medium 5.3 follow-redirects-1.15.11.tgz Transitive 1.15.0
CVE-2026-42041 Medium 4.8 axios-1.14.1.tgz Direct 1.15.1
CVE-2026-40175 Medium 4.8 axios-1.14.1.tgz Direct https://github.com/axios/axios.git - v1.15.0
CVE-2026-42040 Low 3.7 axios-1.14.1.tgz Direct 1.15.1

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

MSC-2026-3522

Vulnerable Libraries - plain-crypto-js-4.2.1.tgz, axios-1.14.1.tgz

plain-crypto-js-4.2.1.tgz

JavaScript library of crypto standards.

Library home page: https://registry.npmjs.org/plain-crypto-js/-/plain-crypto-js-4.2.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/plain-crypto-js/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Root Library)
    • plain-crypto-js-4.2.1.tgz (Vulnerable Library)

axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

The plain-crypto-js npm package version 4.2.1 contains a malicious postinstall script that deploys a cross-platform remote access trojan (RAT). When installed, the script contacts a remote C2 server to deliver second-stage payloads for macOS, Windows, and Linux, then deletes itself and replaces its package.json with a clean decoy to hinder forensic analysis. This package was injected as a hidden dependency into the compromised axios releases 1.14.1 and 0.30.4. Users of plain-crypto-js 4.2.1 or axios 1.14.1 and 0.30.4 are advised to treat affected systems as fully compromised. Axios users should pin to axios@1.14.0 (1.x) or axios@0.29.0 (0.x).

Publish Date: 2026-03-30

URL: MSC-2026-3522

CVSS 3 Score Details (9.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Step up your Open Source Security Game with Mend here

CVE-2026-42264

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. From version 1.0.0 to before version 1.15.2, fFive config properties (auth, baseURL, socketPath, beforeRedirect, and insecureHTTPParser) in the HTTP adapter are read via direct property access without hasOwnProperty guards, making them exploitable as prototype pollution gadgets. When Object.prototype is polluted by another dependency in the same process, axios silently picks up these polluted values on every outbound HTTP request. This issue has been patched in version 1.15.2.

Publish Date: 2026-05-08

URL: CVE-2026-42264

CVSS 3 Score Details (7.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-q8qp-cvcw-x6jj

Release Date: 2026-05-05

Fix Resolution: 1.15.2

Step up your Open Source Security Game with Mend here

CVE-2026-42035

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, a prototype pollution gadget exists in the Axios HTTP adapter (lib/adapters/http.js) that allows an attacker to inject arbitrary HTTP headers into outgoing requests. The vulnerability exploits duck-type checking of the data payload, where if Object.prototype is polluted with getHeaders, append, pipe, on, once, and Symbol.toStringTag, Axios misidentifies any plain object payload as a FormData instance and calls the attacker-controlled getHeaders() function, merging the returned headers into the outgoing request. The vulnerable code resides exclusively in lib/adapters/http.js. The prototype pollution source does not need to originate from Axios itself — any prototype pollution primitive in any dependency in the application's dependency tree is sufficient to trigger this gadget. This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42035

CVSS 3 Score Details (7.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-6chq-wfr3-2hj9

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2026-42033

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when Object.prototype has been polluted by any co-dependency with keys that axios reads without a hasOwnProperty guard, an attacker can (a) silently intercept and modify every JSON response before the application sees it, or (b) fully hijack the underlying HTTP transport, gaining access to request credentials, headers, and body. The precondition is prototype pollution from a separate source in the same process. This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42033

CVSS 3 Score Details (7.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-pf86-5x62-jrwf

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2026-42043

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42043

CVSS 3 Score Details (7.2)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-pmwg-cvhr-8vh7

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2025-62718

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.31.0, Axios does not correctly handle hostname normalization when checking NO_PROXY rules. Requests to loopback addresses like localhost. (with a trailing dot) or [::1] (IPv6 literal) skip NO_PROXY matching and go through the configured proxy. This goes against what developers expect and lets attackers force requests through a proxy, even if NO_PROXY is set up to protect loopback or internal services. This issue leads to the possibility of proxy bypass and SSRF vulnerabilities allowing attackers to reach sensitive loopback or internal services despite the configured protections. This vulnerability is fixed in 1.15.0 and 0.31.0.

Publish Date: 2026-04-09

URL: CVE-2025-62718

CVSS 3 Score Details (7.2)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-3p68-rc4w-qgx5

Release Date: 2026-04-09

Fix Resolution: https://github.com/axios/axios.git - v1.15.0,axios - 0.31.0,axios - 1.15.0

Step up your Open Source Security Game with Mend here

CVE-2026-42038

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, he fix for no_proxy hostname normalization bypass is incomplete. When no_proxy=localhost is set, requests to 127.0.0.1 and [::1] still route through the proxy instead of bypassing it. The shouldBypassProxy() function does pure string matching — it does not resolve IP aliases or loopback equivalents. This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42038

CVSS 3 Score Details (6.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-m7pr-hjqh-92cm

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2026-42044

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.2, he Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution in the application's dependency tree to be escalated into surgical, invisible modification of all JSON API responses — including privilege escalation, balance manipulation, and authorization bypass. The default transformResponse function at lib/defaults/index.js:124 calls JSON.parse(data, this.parseReviver), where this is the merged config object. Because parseReviver is not present in Axios defaults, not validated by assertOptions, and not subject to any constraints, a polluted Object.prototype.parseReviver function is called for every key-value pair in every JSON response, allowing the attacker to selectively modify individual values while leaving the rest of the response intact. This vulnerability is fixed in 1.15.2.

Publish Date: 2026-04-24

URL: CVE-2026-42044

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-3w6x-2g7m-8v23

Release Date: 2026-04-24

Fix Resolution: 1.15.2

Step up your Open Source Security Game with Mend here

CVE-2026-42042

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library's XSRF token protection logic uses JavaScript truthy/falsy semantics instead of strict boolean comparison for the withXSRFToken config property. When this property is set to any truthy non-boolean value (via prototype pollution or misconfiguration), the same-origin check (isURLSameOrigin) is short-circuited, causing XSRF tokens to be sent to all request targets including cross-origin servers controlled by an attacker. This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42042

CVSS 3 Score Details (5.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-xx6v-rp6x-q39c

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2026-42039

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42039

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-62hf-57xw-28j9

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2026-42037

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.1, the FormDataPart constructor in lib/helpers/formDataToStream.js interpolates value.type directly into the Content-Type header of each multipart part without sanitizing CRLF (\r\n) sequences. An attacker who controls the .type property of a Blob/File-like object (e.g., via a user-uploaded file in a Node.js proxy service) can inject arbitrary MIME part headers into the multipart form-data body. This bypasses Node.js v18+ built-in header protections because the injection targets the multipart body structure, not HTTP request headers. This vulnerability is fixed in 1.15.1.

Publish Date: 2026-04-24

URL: CVE-2026-42037

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-445q-vr5w-6q77

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2026-42036

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when responseType: 'stream' is used, Axios returns the response stream without enforcing maxContentLength. This bypasses configured response-size limits and allows unbounded downstream consumption. This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42036

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-vf2m-468p-8v99

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2026-42034

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, for stream request bodies, maxBodyLength is bypassed when maxRedirects is set to 0 (native http/https transport path). Oversized streamed uploads are sent fully even when the caller sets strict body limits. This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42034

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-5c9x-8gcm-mpgx

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2026-40895

Vulnerable Library - follow-redirects-1.15.11.tgz

HTTP and HTTPS modules that follow redirects.

Library home page: https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.11.tgz

Path to dependency file: /backend/package.json

Path to vulnerable library: /backend/node_modules/follow-redirects/package.json,/frontend/explorer/node_modules/follow-redirects/package.json,/frontend/node_modules/follow-redirects/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Root Library)
    • follow-redirects-1.15.11.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

follow-redirects is an open source, drop-in replacement for Node's "http" and "https" modules that automatically follows redirects. Prior to 1.16.0, when an HTTP request follows a cross-domain redirect (301/302/307/308), follow-redirects only strips authorization, proxy-authorization, and cookie headers (matched by regex at index.js). Any custom authentication header (e.g., X-API-Key, X-Auth-Token, Api-Key, Token) is forwarded verbatim to the redirect target. This vulnerability is fixed in 1.16.0.

Publish Date: 2026-04-21

URL: CVE-2026-40895

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-r4q5-vmmm-2653

Release Date: 2026-04-21

Fix Resolution (follow-redirects): 1.16.0

Direct dependency fix Resolution (axios): 1.15.0

Step up your Open Source Security Game with Mend here

CVE-2026-42041

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution to silently suppress all HTTP error responses (401, 403, 500, etc.), causing them to be treated as successful responses. This completely bypasses application-level authentication and error handling. The root cause is that validateStatus is the only config property using the mergeDirectKeys merge strategy, which uses JavaScript's in operator — an operator that inherently traverses the prototype chain. When Object.prototype.validateStatus is polluted with () => true, all HTTP status codes are accepted as success. This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42041

CVSS 3 Score Details (4.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-w9j2-pvgh-6h63

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

CVE-2026-40175

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.3.1, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0 and 0.3.1.

Publish Date: 2026-04-10

URL: CVE-2026-40175

CVSS 3 Score Details (4.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-10

Fix Resolution: https://github.com/axios/axios.git - v1.15.0

Step up your Open Source Security Game with Mend here

CVE-2026-42040

Vulnerable Library - axios-1.14.1.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-1.14.1.tgz

Path to dependency file: /frontend/explorer/package.json

Path to vulnerable library: /frontend/explorer/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-1.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f1cc4f79fdab9e4d90aa9caf963ea2e271c0183

Found in base branch: main

Vulnerability Details

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the encode() function in lib/helpers/AxiosURLSearchParams.js contains a character mapping (charMap) at line 21 that reverses the safe percent-encoding of null bytes. After encodeURIComponent('\x00') correctly produces the safe sequence %00, the charMap entry '%00': '\x00' converts it back to a raw null byte. Primary impact is limited because the standard axios request flow is not affected. This vulnerability is fixed in 1.15.1 and 0.31.1.

Publish Date: 2026-04-24

URL: CVE-2026-42040

CVSS 3 Score Details (3.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-xhjh-pmcv-23jw

Release Date: 2026-04-24

Fix Resolution: 1.15.1

Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions