Skip to content
CVSS 7.2 · HIGH

CVE-2026-42043

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.

Ver en NVD

Análisis

Axios versions prior to 1.15.1 and 0.31.1 contain a flaw that allows attackers to bypass NO_PROXY settings using specific loopback addresses. If your Node.js backend uses Axios to fetch user-provided URLs or relies on proxy configurations for security isolation, you should upgrade to the fixed versions to prevent potential Server-Side Request Forgery (SSRF) attacks.

Severidad

Puntaje: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: CHANGED
C: LOW
I: LOW
A: NONE
Tipo de falla (CWE): CWE-183CWE-441CWE-918

EPSS

Probabilidad de explotación (próx. 30 días): 0.0004 (0.0%)
Percentil: 13.1%
EPSS: 2026-05-06

Afecta

axios:axios

Descripción técnica

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.

Publicada: 24/4/2026, 18:16:31
Última modificación: 27/4/2026, 20:05:04

Referencias

InicioEventosBlogRecursosEquipo