Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-40175

Опубликовано: 10 апр. 2026
Источник: debian

Описание

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-axiosfixed1.15.0-1package

Примечания

  • https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx

  • https://github.com/axios/axios/pull/10660

  • Fixed by: https://github.com/axios/axios/commit/363185461b90b1b78845dc8a99a1f103d9b122a1 (v1.15.0)

Связанные уязвимости

CVSS3: 10
ubuntu
2 дня назад

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0.

CVSS3: 9
redhat
5 дней назад

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0.

CVSS3: 10
nvd
5 дней назад

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0.

CVSS3: 10
github
5 дней назад

Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain