Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-58754

Опубликовано: 12 сент. 2025
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the data: scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (Buffer/Blob) and returns a synthetic 200 response. This path ignores maxContentLength / maxBodyLength (which only protect HTTP responses), so an attacker can supply a very large data: URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested responseType: 'stream'. Versions 0.30.2 and 1.12.0 contain a patch for the issue.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:axios:axios:*:*:*:*:*:node.js:*:*
Версия до 0.30.2 (исключая)
cpe:2.3:a:axios:axios:*:*:*:*:*:node.js:*:*
Версия от 1.0.0 (включая) до 1.12.0 (исключая)

EPSS

Процентиль: 11%
0.00038
Низкий

7.5 High

CVSS3

Дефекты

CWE-770

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 месяцев назад

Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.

CVSS3: 5.3
redhat
около 2 месяцев назад

Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to version 1.11.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Version 1.11.0 contains a patch for the issue.

msrc
около 2 месяцев назад

Axios is vulnerable to DoS attack through lack of data size check

CVSS3: 7.5
debian
около 2 месяцев назад

Axios is a promise based HTTP client for the browser and Node.js. When ...

CVSS3: 7.5
github
около 2 месяцев назад

Axios is vulnerable to DoS attack through lack of data size check

EPSS

Процентиль: 11%
0.00038
Низкий

7.5 High

CVSS3

Дефекты

CWE-770