Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42043— Axios: Incomplete Fix for CVE-2025-62718 — NO_PROXY Protection Bypassed via RFC 1122 Loopback Subnet (127.0.0.0/8) in Axios 1.15.0

CVSS 7.2 · High EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42043

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Axios: Incomplete Fix for CVE-2025-62718 — NO_PROXY Protection Bypassed via RFC 1122 Loopback Subnet (127.0.0.0/8) in Axios 1.15.0
Source: NVD (National Vulnerability Database)
Vulnerability Description
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
宽松定义的白名单
Source: NVD (National Vulnerability Database)
Vulnerability Title
Axios 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Axios是Axios开源的一款基于Promise(异步编程的一种解决方案)的HTTP客户端。 Axios 1.15.1之前版本和0.31.1之前版本存在安全漏洞,该漏洞源于攻击者可以影响Axios请求的目标URL,使用127.0.0.0/8范围内的任何地址完全绕过NO_PROXY保护。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
axiosaxios >= 1.0.0, < 1.15.1 -

II. Public POCs for CVE-2026-42043

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42043

登录查看更多情报信息。

Same Patch Batch · axios · 2026-04-24 · 12 CVEs total

CVE-2026-420337.4 HIGHAxios: Prototype Pollution Gadgets - Response Tampering, Data Exfiltration, and Request Hi
CVE-2026-420357.4 HIGHAxios: Header Injection via Prototype Pollution
CVE-2026-420386.8 MEDIUMAxios: no_proxy bypass via IP alias allows SSRF
CVE-2026-420446.5 MEDIUMAxios: Invisible JSON Response Tampering via Prototype Pollution Gadget in `parseReviver`
CVE-2026-420425.4 MEDIUMAxios: XSRF Token Cross-Origin Leakage via Prototype Pollution Gadget in `withXSRFToken` B
CVE-2026-420375.3 MEDIUMAxios: CRLF Injection in multipart/form-data body via unsanitized blob.type in formDataToS
CVE-2026-420345.3 MEDIUMAxios: HTTP adapter streamed uploads bypass maxBodyLength when maxRedirects: 0
CVE-2026-420365.3 MEDIUMAxios: HTTP adapter streamed responses bypass maxContentLength
CVE-2026-420414.8 MEDIUMAxios: Authentication Bypass via Prototype Pollution Gadget in `validateStatus` Merge Stra
CVE-2026-420403.7 LOWAxios: Null Byte Injection via Reverse-Encoding in AxiosURLSearchParams
CVE-2026-42039Axios: unbounded recursion in toFormData causes DoS via deeply nested request data

IV. Related Vulnerabilities

V. Comments for CVE-2026-42043

No comments yet


Leave a comment