Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42040— Axios: Null Byte Injection via Reverse-Encoding in AxiosURLSearchParams

CVSS 3.7 · Low EPSS 0.06% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42040

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Axios: Null Byte Injection via Reverse-Encoding in AxiosURLSearchParams
Source: NVD (National Vulnerability Database)
Vulnerability Description
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the encode() function in lib/helpers/AxiosURLSearchParams.js contains a character mapping (charMap) at line 21 that reverses the safe percent-encoding of null bytes. After encodeURIComponent('\x00') correctly produces the safe sequence %00, the charMap entry '%00': '\x00' converts it back to a raw null byte. Primary impact is limited because the standard axios request flow is not affected. This vulnerability is fixed in 1.15.1 and 0.31.1.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对输出编码和转义不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Axios 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Axios是Axios开源的一款基于Promise(异步编程的一种解决方案)的HTTP客户端。 Axios 1.15.1之前版本和0.31.1之前版本存在安全漏洞,该漏洞源于encode函数中的字符映射将安全百分号编码的空字节反转回原始空字节。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
axiosaxios >= 1.0.0, < 1.15.1 -

II. Public POCs for CVE-2026-42040

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42040

登录查看更多情报信息。

Same Patch Batch · axios · 2026-04-24 · 12 CVEs total

CVE-2026-420337.4 HIGHAxios: Prototype Pollution Gadgets - Response Tampering, Data Exfiltration, and Request Hi
CVE-2026-420357.4 HIGHAxios: Header Injection via Prototype Pollution
CVE-2026-420437.2 HIGHAxios: Incomplete Fix for CVE-2025-62718 — NO_PROXY Protection Bypassed via RFC 1122 Loop
CVE-2026-420386.8 MEDIUMAxios: no_proxy bypass via IP alias allows SSRF
CVE-2026-420446.5 MEDIUMAxios: Invisible JSON Response Tampering via Prototype Pollution Gadget in `parseReviver`
CVE-2026-420425.4 MEDIUMAxios: XSRF Token Cross-Origin Leakage via Prototype Pollution Gadget in `withXSRFToken` B
CVE-2026-420375.3 MEDIUMAxios: CRLF Injection in multipart/form-data body via unsanitized blob.type in formDataToS
CVE-2026-420345.3 MEDIUMAxios: HTTP adapter streamed uploads bypass maxBodyLength when maxRedirects: 0
CVE-2026-420365.3 MEDIUMAxios: HTTP adapter streamed responses bypass maxContentLength
CVE-2026-420414.8 MEDIUMAxios: Authentication Bypass via Prototype Pollution Gadget in `validateStatus` Merge Stra
CVE-2026-42039Axios: unbounded recursion in toFormData causes DoS via deeply nested request data

IV. Related Vulnerabilities

V. Comments for CVE-2026-42040

No comments yet


Leave a comment