CVE-2025-27152 (Medium) Detected In Axios-0.26.0.tgz, Axios-0.21.1.tgz
CVE-2025-27152 (Medium) Detected in axios-0.26.0.tgz and axios-0.21.1.tgz: A Critical Vulnerability in Popular HTTP Client Library
Introduction
In the ever-evolving landscape of software development, security vulnerabilities can have a significant impact on the integrity and reliability of applications. One such vulnerability, CVE-2025-27152, has been detected in the popular HTTP client library axios. This article will delve into the details of this vulnerability, its impact, and the suggested fix to ensure the security of your applications.
CVE-2025-27152: A Medium Severity Vulnerability
axios is a promise-based HTTP client for both the browser and node.js. However, a critical vulnerability has been discovered in versions 0.26.0.tgz and 0.21.1.tgz of the library. The issue arises when passing absolute URLs instead of protocol-relative URLs to axios. Even if the baseURL is set, axios sends the request to the specified absolute URL, potentially causing Server-Side Request Forgery (SSRF) and credential leakage. This vulnerability affects both server-side and client-side usage of axios.
Vulnerable Libraries
The vulnerable libraries are:
- axios-0.26.0.tgz
- axios-0.21.1.tgz
These libraries are part of the following dependency hierarchies:
- @zgriesinger/logger-file:packages/backend/logger.tgz (Root Library)
- common-8.4.0.tgz
- axios-0.26.0.tgz (Vulnerable Library)
- common-8.4.0.tgz
- @zgriesinger/service-a-file:api/service-a.tgz (Root Library)
- nestjs-dynamodb-0.1.0.tgz
- common-7.6.18.tgz
- axios-0.21.1.tgz (Vulnerable Library)
- common-7.6.18.tgz
- nestjs-dynamodb-0.1.0.tgz
Vulnerability Details
The vulnerability occurs when passing absolute URLs to axios, even if the baseURL is set. This can lead to SSRF and credential leakage. The issue is fixed in version 1.8.2 of axios.
CVSS 3 Score Details
The CVSS 3 score for this vulnerability is 5.5. The base score metrics are:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
The suggested fix for this vulnerability is to upgrade to version 1.8.2 of axios. This version fixes the issue and ensures the security of your applications.
Conclusion
The detection of CVE-2025-27152 in axios-0.26.0.tgz and axios-0.21.1.tgz highlights the importance of regular security audits and updates in software development. By upgrading to the latest version of axios, developers can ensure the security and reliability of their applications. It is essential to stay vigilant and address security vulnerabilities promptly to prevent potential attacks and data breaches.
Additional Resources
For more information on CVE-2025-27152, please visit the following resources:
- Mend.io Vulnerability Database: https://www.mend.io/vulnerability-database/CVE-2025-27152
- CVSS 3 Calculator: https://www.first.org/cvss/calculator/3.0
CVE-2025-27152 (Medium) Detected in axios-0.26.0.tgz and axios-0.21.1.tgz: A Critical Vulnerability in Popular HTTP Client Library - Q&A
Introduction
In our previous article, we discussed the detection of CVE-2025-27152, a medium severity vulnerability in the popular HTTP client library axios. This article will provide a Q&A section to address common questions and concerns related to this vulnerability.
Q&A
Q: What is CVE-2025-27152?
A: CVE-2025-27152 is a medium severity vulnerability detected in versions 0.26.0.tgz and 0.21.1.tgz of the axios library. The issue arises when passing absolute URLs instead of protocol-relative URLs to axios, potentially causing Server-Side Request Forgery (SSRF) and credential leakage.
Q: What is the impact of CVE-2025-27152?
A: The vulnerability can lead to SSRF and credential leakage, affecting both server-side and client-side usage of axios. This can result in unauthorized access to sensitive data and potentially compromise the security of your applications.
Q: Which versions of axios are affected?
A: Versions 0.26.0.tgz and 0.21.1.tgz of axios are affected by this vulnerability.
Q: How can I identify if my application is affected?
A: You can check your application's dependency hierarchy to see if it includes axios-0.26.0.tgz or axios-0.21.1.tgz. If you find these versions in your dependency hierarchy, you may be affected by this vulnerability.
Q: What is the suggested fix for CVE-2025-27152?
A: The suggested fix is to upgrade to version 1.8.2 of axios, which fixes the issue and ensures the security of your applications.
Q: Can I patch the affected versions of axios instead of upgrading?
A: While patching may be possible, it is not recommended. The best course of action is to upgrade to the latest version of axios, which includes the fix for this vulnerability.
Q: How can I prevent similar vulnerabilities in the future?
A: To prevent similar vulnerabilities, it is essential to:
- Regularly update your dependencies to the latest versions.
- Conduct regular security audits and vulnerability scans.
- Implement a robust testing and validation process for your applications.
- Stay informed about security vulnerabilities and updates in the libraries you use.
Conclusion
The detection of CVE-2025-27152 in axios-0.26.0.tgz and axios-0.21.1.tgz highlights the importance of regular security audits and updates in software development. By upgrading to the latest version of axios and following best practices for security, developers can ensure the security and reliability of their applications.
Additional Resources
For more information on CVE-2025-27152, please visit the following resources:
- Mend.io Vulnerability Database: https://www.mend.io/vulnerability-database/CVE-2025-27152
- CVSS 3 Calculator: https://www.first.org/cvss/calculator/3.0
- axios Documentation: https://axios-http.com/docs/intro