axios@1.7.1 vulnerabilities

Promise based HTTP client for the browser and node.js

  • latest version

    1.12.2

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    4 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the axios package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Allocation of Resources Without Limits or Throttling

    axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the data: URL handler. An attacker can trigger a denial of service by crafting a data: URL with an excessive payload, causing allocation of memory for content decoding before verifying content size limits.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade axios to version 1.12.0 or higher.

    <1.12.0
    • M
    Server-side Request Forgery (SSRF)

    axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to not setting allowAbsoluteUrls to false by default when processing a requested URL in buildFullPath(). It may not be obvious that this value is being used with the less safe default, and URLs that are expected to be blocked may be accepted. This is a bypass of the fix for the vulnerability described in CVE-2025-27152.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade axios to version 0.30.0, 1.8.3 or higher.

    <0.30.0>=1.0.0 <1.8.3
    • M
    Server-side Request Forgery (SSRF)

    axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to the allowAbsoluteUrls attribute being ignored in the call to the buildFullPath function from the HTTP adapter. An attacker could launch SSRF attacks or exfiltrate sensitive data by tricking applications into sending requests to malicious endpoints.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade axios to version 0.30.0, 1.8.2 or higher.

    <0.30.0>=1.0.0 <1.8.2
    • H
    Server-side Request Forgery (SSRF)

    axios is a promise-based HTTP client for the browser and Node.js.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through unexpected behavior where requests for path-relative URLs get processed as protocol-relative URLs. An attacker can manipulate the server to make unauthorized requests by exploiting this behavior.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade axios to version 1.7.4 or higher.

    >=1.3.2 <1.7.4