Skip to content
CVSS 7.2 · HIGH

CVE-2026-42043

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.

View on NVD

Analysis

Axios versions prior to 1.15.1 and 0.31.1 contain a flaw that allows attackers to bypass NO_PROXY settings using specific loopback addresses. If your Node.js backend uses Axios to fetch user-provided URLs or relies on proxy configurations for security isolation, you should upgrade to the fixed versions to prevent potential Server-Side Request Forgery (SSRF) attacks.

Severity

Score: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: CHANGED
C: LOW
I: LOW
A: NONE
Weakness (CWE): CWE-183CWE-441CWE-918

EPSS

Probability of exploitation (next 30 days): 0.0004 (0.0%)
Percentile: 13.1%
EPSS: 2026-05-06

Affects

axios:axios

Technical description

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.

Published: 4/24/2026, 6:16:31 PM
Last modified: 4/27/2026, 8:05:04 PM

References

HomeEventsBlogResourcesTeam