Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42044— Axios: Invisible JSON Response Tampering via Prototype Pollution Gadget in `parseReviver`

CVSS 6.5 · Medium EPSS 0.10% · P27
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42044

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Axios: Invisible JSON Response Tampering via Prototype Pollution Gadget in `parseReviver`
Source: NVD (National Vulnerability Database)
Vulnerability Description
Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.2, he Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution in the application's dependency tree to be escalated into surgical, invisible modification of all JSON API responses — including privilege escalation, balance manipulation, and authorization bypass. The default transformResponse function at lib/defaults/index.js:124 calls JSON.parse(data, this.parseReviver), where this is the merged config object. Because parseReviver is not present in Axios defaults, not validated by assertOptions, and not subject to any constraints, a polluted Object.prototype.parseReviver function is called for every key-value pair in every JSON response, allowing the attacker to selectively modify individual values while leaving the rest of the response intact. This vulnerability is fixed in 1.15.2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-915
Source: NVD (National Vulnerability Database)
Vulnerability Title
Axios 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Axios是Axios开源的一款基于Promise(异步编程的一种解决方案)的HTTP客户端。 Axios 1.0.0版本至1.15.2之前版本存在安全漏洞,该漏洞源于默认transformResponse函数调用JSON.parse时使用合并配置对象中的parseReviver,当Object.prototype.parseReviver被污染时,攻击者可以选择性修改每个JSON响应中的值。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
axiosaxios >= 1.0.0, < 1.15.2 -

II. Public POCs for CVE-2026-42044

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42044

Please Login to view more intelligence information

Same Patch Batch · axios · 2026-04-24 · 12 CVEs total

CVE-2026-420337.4 HIGHAxios: Prototype Pollution Gadgets - Response Tampering, Data Exfiltration, and Request Hi
CVE-2026-420357.4 HIGHAxios: Header Injection via Prototype Pollution
CVE-2026-420437.2 HIGHAxios: Incomplete Fix for CVE-2025-62718 — NO_PROXY Protection Bypassed via RFC 1122 Loop
CVE-2026-420386.8 MEDIUMAxios: no_proxy bypass via IP alias allows SSRF
CVE-2026-420425.4 MEDIUMAxios: XSRF Token Cross-Origin Leakage via Prototype Pollution Gadget in `withXSRFToken` B
CVE-2026-420375.3 MEDIUMAxios: CRLF Injection in multipart/form-data body via unsanitized blob.type in formDataToS
CVE-2026-420345.3 MEDIUMAxios: HTTP adapter streamed uploads bypass maxBodyLength when maxRedirects: 0
CVE-2026-420365.3 MEDIUMAxios: HTTP adapter streamed responses bypass maxContentLength
CVE-2026-420414.8 MEDIUMAxios: Authentication Bypass via Prototype Pollution Gadget in `validateStatus` Merge Stra
CVE-2026-420403.7 LOWAxios: Null Byte Injection via Reverse-Encoding in AxiosURLSearchParams
CVE-2026-42039Axios: unbounded recursion in toFormData causes DoS via deeply nested request data

IV. Related Vulnerabilities

V. Comments for CVE-2026-42044

No comments yet


Leave a comment