org.webjars.npm:axios@0.19.2 vulnerabilities

  • latest version

    1.8.4

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    18 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars.npm:axios package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Server-side Request Forgery (SSRF)

    org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to not setting allowAbsoluteUrls to false by default when processing a requested URL in buildFullPath(). It may not be obvious that this value is being used with the less safe default, and URLs that are expected to be blocked may be accepted. This is a bypass of the fix for the vulnerability described in CVE-2025-27152.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade org.webjars.npm:axios to version 1.8.3 or higher.

    [,1.8.3)
    • M
    Server-side Request Forgery (SSRF)

    org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to the allowAbsoluteUrls attribute being ignored in the call to the buildFullPath function from the HTTP adapter. An attacker could launch SSRF attacks or exfiltrate sensitive data by tricking applications into sending requests to malicious endpoints.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade org.webjars.npm:axios to version 1.8.3 or higher.

    [,1.8.3)
    • H
    Server-side Request Forgery (SSRF)

    org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through unexpected behavior where requests for path-relative URLs get processed as protocol-relative URLs. An attacker can manipulate the server to make unauthorized requests by exploiting this behavior.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade org.webjars.npm:axios to version 1.7.4 or higher.

    [,1.7.4)
    • H
    Prototype Pollution

    org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Prototype Pollution via the formDataToJSON function.

    How to fix Prototype Pollution?

    Upgrade org.webjars.npm:axios to version 1.6.5 or higher.

    [,1.6.5)
    • M
    Regular Expression Denial of Service (ReDoS)

    org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). An attacker can deplete system resources by providing a manipulated string as input to the format method, causing the regular expression to exhibit a time complexity of O(n^2). This makes the server to become unable to provide normal service due to the excessive cost and time wasted in processing vulnerable regular expressions.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade org.webjars.npm:axios to version 1.6.5 or higher.

    [,1.6.5)
    • H
    Cross-site Request Forgery (CSRF)

    org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to inserting the X-XSRF-TOKEN header using the secret XSRF-TOKEN cookie value in all requests to any server when the XSRF-TOKEN0 cookie is available, and the withCredentials setting is turned on. If a malicious user manages to obtain this value, it can potentially lead to the XSRF defence mechanism bypass.

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade org.webjars.npm:axios to version 1.6.0, 0.28.0 or higher.

    [1.0.0,1.6.0)[0.8.1,0.28.0)
    • H
    Regular Expression Denial of Service (ReDoS)

    org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim function.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade org.webjars.npm:axios to version 0.21.4 or higher.

    [,0.21.4)
    • M
    Server-Side Request Forgery (SSRF)

    org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). An attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.

    How to fix Server-Side Request Forgery (SSRF)?

    Upgrade org.webjars.npm:axios to version 0.21.1 or higher.

    [0,0.21.1)