Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42042— Axios: XSRF Token Cross-Origin Leakage via Prototype Pollution Gadget in `withXSRFToken` Boolean Coercion

CVSS 5.4 · Medium EPSS 0.03% · P10
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42042

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Axios: XSRF Token Cross-Origin Leakage via Prototype Pollution Gadget in `withXSRFToken` Boolean Coercion
Source: NVD (National Vulnerability Database)
Vulnerability Description
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library's XSRF token protection logic uses JavaScript truthy/falsy semantics instead of strict boolean comparison for the withXSRFToken config property. When this property is set to any truthy non-boolean value (via prototype pollution or misconfiguration), the same-origin check (isURLSameOrigin) is short-circuited, causing XSRF tokens to be sent to all request targets including cross-origin servers controlled by an attacker. This vulnerability is fixed in 1.15.1 and 0.31.1.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
宽松定义的白名单
Source: NVD (National Vulnerability Database)
Vulnerability Title
Axios 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Axios是Axios开源的一款基于Promise(异步编程的一种解决方案)的HTTP客户端。 Axios 1.15.1之前版本和0.31.1之前版本存在安全漏洞,该漏洞源于XSRF令牌保护逻辑使用JavaScript真值/假值语义而非严格布尔比较,导致同源检查被短路,XSRF令牌发送到所有请求目标。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
axiosaxios >= 1.0.0, < 1.15.1 -

II. Public POCs for CVE-2026-42042

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42042

登录查看更多情报信息。

Same Patch Batch · axios · 2026-04-24 · 12 CVEs total

CVE-2026-420337.4 HIGHAxios: Prototype Pollution Gadgets - Response Tampering, Data Exfiltration, and Request Hi
CVE-2026-420357.4 HIGHAxios: Header Injection via Prototype Pollution
CVE-2026-420437.2 HIGHAxios: Incomplete Fix for CVE-2025-62718 — NO_PROXY Protection Bypassed via RFC 1122 Loop
CVE-2026-420386.8 MEDIUMAxios: no_proxy bypass via IP alias allows SSRF
CVE-2026-420446.5 MEDIUMAxios: Invisible JSON Response Tampering via Prototype Pollution Gadget in `parseReviver`
CVE-2026-420375.3 MEDIUMAxios: CRLF Injection in multipart/form-data body via unsanitized blob.type in formDataToS
CVE-2026-420345.3 MEDIUMAxios: HTTP adapter streamed uploads bypass maxBodyLength when maxRedirects: 0
CVE-2026-420365.3 MEDIUMAxios: HTTP adapter streamed responses bypass maxContentLength
CVE-2026-420414.8 MEDIUMAxios: Authentication Bypass via Prototype Pollution Gadget in `validateStatus` Merge Stra
CVE-2026-420403.7 LOWAxios: Null Byte Injection via Reverse-Encoding in AxiosURLSearchParams
CVE-2026-42039Axios: unbounded recursion in toFormData causes DoS via deeply nested request data

IV. Related Vulnerabilities

V. Comments for CVE-2026-42042

No comments yet


Leave a comment