CVE-2025-27152 (Medium) Detected In Axios-0.21.1.tgz

by ADMIN 53 views

CVE-2025-27152 (Medium) Detected in axios-0.21.1.tgz: A Critical Vulnerability in a Popular HTTP Client Library

Introduction

In the ever-evolving landscape of software development, vulnerabilities in popular libraries can have far-reaching consequences. One such vulnerability has been detected in the axios-0.21.1.tgz library, a widely used promise-based HTTP client for the browser and node.js. In this article, we will delve into the details of the CVE-2025-27152 vulnerability, its impact, and the suggested fix.

CVE-2025-27152 - Medium Severity Vulnerability

The axios library is a crucial component in many web applications, enabling developers to make HTTP requests with ease. However, a recent vulnerability has been discovered in the axios-0.21.1.tgz version, which can lead to Server-Side Request Forgery (SSRF) and credential leakage. This issue arises when passing absolute URLs rather than protocol-relative URLs to axios, even if the baseURL is set.

The axios library is a promise-based HTTP client for the browser and node.js.

The axios library is a promise-based HTTP client for the browser and node.js.

Library home page: https://registry.npmjs.org/axios/-/axios-0.21.1.tgz

Library home page: https://registry.npmjs.org/axios/-/axios-0.21.1.tgz

Path to dependency file: /node_modules/axios/package.json

Path to dependency file: /node_modules/axios/package.json

Path to vulnerable library: /node_modules/axios/package.json

Path to vulnerable library: /node_modules/axios/package.json

Dependency Hierarchy

The axios library is part of a larger dependency hierarchy, which includes the chromedriver-89.0.0.tgz library as the root library.

Dependency Hierarchy:

  • chromedriver-89.0.0.tgz (Root Library)
    • :x: axios-0.21.1.tgz (Vulnerable Library)

Found in HEAD Commit

The CVE-2025-27152 vulnerability was found in the HEAD commit of the snowdensb/vets-website repository.

Found in HEAD commit: https://github.com/snowdensb/vets-website/commit/ca255a4489b5c937cfb850ddee46dc5b8c99d85e

Found in HEAD commit: https://github.com/snowdensb/vets-website/commit/ca255a4489b5c937cfb850ddee46dc5b8c99d85e

Found in Base Branch

The vulnerability was also found in the master branch of the repository.

Found in base branch: master

Found in base branch: master

Vulnerability Details

The axios library is a promise-based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.

axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.

Publish Date and URL

The CVE-2025-27152 vulnerability was published on 2025-03-07 and can be found on the Mend.io vulnerability database.

Publish Date: 2025-03-07

Publish Date: 2025-03-07

URL: https://www.mend.io/vulnerability-database/CVE-2025-27152

URL: https://www.mend.io/vulnerability-database/CVE-2025-27152

CVSS 3 Score Details

The CVE-2025-27152 vulnerability has a CVSS 3 score of 5.5, indicating a medium severity vulnerability.

CVSS 3 Score Details (5.5)

  • Base Score Metrics:
    • Exploitability Metrics:
      • Attack Vector: Local
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Unchanged
    • Impact Metrics:
      • Confidentiality Impact: None
      • Integrity Impact: None
      • Availability Impact: High

Suggested Fix

The suggested fix for the CVE-2025-27152 vulnerability is to upgrade the axios library to version 1.8.2.

Suggested Fix

  • Type: Upgrade version
  • Release Date: 2025-03-07
  • Fix Resolution: v1.8.2

In conclusion, the CVE-2025-27152 vulnerability in the axios-0.21.1.tgz library is a critical issue that can lead to SSRF and credential leakage. It is essential to upgrade the axios library to version 1.8.2 to mitigate this vulnerability.
CVE-2025-27152 (Medium) Detected in axios-0.21.1.tgz: A Critical Vulnerability in a Popular HTTP Client Library - Q&A

Introduction

In our previous article, we discussed the CVE-2025-27152 vulnerability in the axios-0.21.1.tgz library, a widely used promise-based HTTP client for the browser and node.js. In this article, we will address some of the frequently asked questions (FAQs) related to this vulnerability.

Q&A

Q: What is the CVE-2025-27152 vulnerability?

A: The CVE-2025-27152 vulnerability is a medium severity vulnerability in the axios-0.21.1.tgz library, which can lead to Server-Side Request Forgery (SSRF) and credential leakage.

Q: What is the impact of the CVE-2025-27152 vulnerability?

A: The CVE-2025-27152 vulnerability can impact both server-side and client-side usage of axios, potentially causing SSRF and credential leakage.

Q: How does the CVE-2025-27152 vulnerability occur?

A: The CVE-2025-27152 vulnerability occurs when passing absolute URLs rather than protocol-relative URLs to axios, even if the baseURL is set.

Q: What is the suggested fix for the CVE-2025-27152 vulnerability?

A: The suggested fix for the CVE-2025-27152 vulnerability is to upgrade the axios library to version 1.8.2.

Q: What is the CVSS 3 score of the CVE-2025-27152 vulnerability?

A: The CVSS 3 score of the CVE-2025-27152 vulnerability is 5.5, indicating a medium severity vulnerability.

Q: What is the impact of the CVE-2025-27152 vulnerability on confidentiality, integrity, and availability?

A: The CVE-2025-27152 vulnerability has a high impact on availability, but no impact on confidentiality and integrity.

Q: What is the recommended course of action for developers who are using the axios-0.21.1.tgz library?

A: Developers who are using the axios-0.21.1.tgz library should upgrade to version 1.8.2 as soon as possible to mitigate the CVE-2025-27152 vulnerability.

Q: Can the CVE-2025-27152 vulnerability be exploited remotely?

A: No, the CVE-2025-27152 vulnerability cannot be exploited remotely. It requires user interaction to exploit.

Q: What is the recommended way to prevent the CVE-2025-27152 vulnerability?

A: The recommended way to prevent the CVE-2025-27152 vulnerability is to use protocol-relative URLs when making requests with axios and to upgrade to version 1.8.2.

Conclusion

The CVE-2025-27152 vulnerability in the axios-0.21.1.tgz library is a critical issue that can lead to SSRF and credential leakage. It is essential to upgrade the axios library to version 1.8.2 to mitigate this vulnerability. We hope that this Q&A article has provided valuable information to help developers understand and address this vulnerability.

Additional Resources

Stay Informed

To stay informed about the latest security vulnerabilities and updates, follow us on social media or sign up for our newsletter.