Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-axios@1.15.2-1
Typedeb
Namespacedebian
Namenode-axios
Version1.15.2-1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-671j-k4zn-xbgk
vulnerability_id VCID-671j-k4zn-xbgk
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, he fix for no_proxy hostname normalization bypass is incomplete. When no_proxy=localhost is set, requests to 127.0.0.1 and [::1] still route through the proxy instead of bypassing it. The shouldBypassProxy() function does pure string matching — it does not resolve IP aliases or loopback equivalents. This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42038
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09121
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42038
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42038
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-m7pr-hjqh-92cm
reference_id GHSA-m7pr-hjqh-92cm
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-27T13:46:29Z/
url https://github.com/axios/axios/security/advisories/GHSA-m7pr-hjqh-92cm
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42038
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-671j-k4zn-xbgk
1
url VCID-8352-4tud-y3f4
vulnerability_id VCID-8352-4tud-y3f4
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when Object.prototype has been polluted by any co-dependency with keys that axios reads without a hasOwnProperty guard, an attacker can (a) silently intercept and modify every JSON response before the application sees it, or (b) fully hijack the underlying HTTP transport, gaining access to request credentials, headers, and body. The precondition is prototype pollution from a separate source in the same process. This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42033
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09688
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42033
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42033
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-pf86-5x62-jrwf
reference_id GHSA-pf86-5x62-jrwf
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-24T18:28:14Z/
url https://github.com/axios/axios/security/advisories/GHSA-pf86-5x62-jrwf
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42033
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8352-4tud-y3f4
2
url VCID-cj5w-7hbe-wqex
vulnerability_id VCID-cj5w-7hbe-wqex
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, for stream request bodies, maxBodyLength is bypassed when maxRedirects is set to 0 (native http/https transport path). Oversized streamed uploads are sent fully even when the caller sets strict body limits. This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42034
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11627
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42034
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42034
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-5c9x-8gcm-mpgx
reference_id GHSA-5c9x-8gcm-mpgx
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-24T18:12:43Z/
url https://github.com/axios/axios/security/advisories/GHSA-5c9x-8gcm-mpgx
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42034
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cj5w-7hbe-wqex
3
url VCID-drqq-9mkv-qkbx
vulnerability_id VCID-drqq-9mkv-qkbx
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42043
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.0749
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42043
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42043
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-pmwg-cvhr-8vh7
reference_id GHSA-pmwg-cvhr-8vh7
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-27T13:47:20Z/
url https://github.com/axios/axios/security/advisories/GHSA-pmwg-cvhr-8vh7
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42043
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drqq-9mkv-qkbx
4
url VCID-e86t-8z3n-sqgd
vulnerability_id VCID-e86t-8z3n-sqgd
summary Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.1, the FormDataPart constructor in lib/helpers/formDataToStream.js interpolates value.type directly into the Content-Type header of each multipart part without sanitizing CRLF (\r\n) sequences. An attacker who controls the .type property of a Blob/File-like object (e.g., via a user-uploaded file in a Node.js proxy service) can inject arbitrary MIME part headers into the multipart form-data body. This bypasses Node.js v18+ built-in header protections because the injection targets the multipart body structure, not HTTP request headers. This vulnerability is fixed in 1.15.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42037
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12339
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42037
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42037
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42037
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e86t-8z3n-sqgd
5
url VCID-gtc3-vrcs-yfb9
vulnerability_id VCID-gtc3-vrcs-yfb9
summary Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.2, he Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution in the application's dependency tree to be escalated into surgical, invisible modification of all JSON API responses — including privilege escalation, balance manipulation, and authorization bypass. The default transformResponse function at lib/defaults/index.js:124 calls JSON.parse(data, this.parseReviver), where this is the merged config object. Because parseReviver is not present in Axios defaults, not validated by assertOptions, and not subject to any constraints, a polluted Object.prototype.parseReviver function is called for every key-value pair in every JSON response, allowing the attacker to selectively modify individual values while leaving the rest of the response intact. This vulnerability is fixed in 1.15.2.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42044
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08451
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42044
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42044
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-3w6x-2g7m-8v23
reference_id GHSA-3w6x-2g7m-8v23
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-24T18:11:49Z/
url https://github.com/axios/axios/security/advisories/GHSA-3w6x-2g7m-8v23
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42044
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gtc3-vrcs-yfb9
6
url VCID-nmzm-1341-jfgt
vulnerability_id VCID-nmzm-1341-jfgt
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, a prototype pollution gadget exists in the Axios HTTP adapter (lib/adapters/http.js) that allows an attacker to inject arbitrary HTTP headers into outgoing requests. The vulnerability exploits duck-type checking of the data payload, where if Object.prototype is polluted with getHeaders, append, pipe, on, once, and Symbol.toStringTag, Axios misidentifies any plain object payload as a FormData instance and calls the attacker-controlled getHeaders() function, merging the returned headers into the outgoing request. The vulnerable code resides exclusively in lib/adapters/http.js. The prototype pollution source does not need to originate from Axios itself — any prototype pollution primitive in any dependency in the application's dependency tree is sufficient to trigger this gadget. This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42035
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09688
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42035
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42035
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-6chq-wfr3-2hj9
reference_id GHSA-6chq-wfr3-2hj9
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-24T18:07:43Z/
url https://github.com/axios/axios/security/advisories/GHSA-6chq-wfr3-2hj9
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42035
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmzm-1341-jfgt
7
url VCID-p78g-vmhn-yyck
vulnerability_id VCID-p78g-vmhn-yyck
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library's XSRF token protection logic uses JavaScript truthy/falsy semantics instead of strict boolean comparison for the withXSRFToken config property. When this property is set to any truthy non-boolean value (via prototype pollution or misconfiguration), the same-origin check (isURLSameOrigin) is short-circuited, causing XSRF tokens to be sent to all request targets including cross-origin servers controlled by an attacker. This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42042
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07769
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42042
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42042
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42042
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p78g-vmhn-yyck
8
url VCID-tdwz-gg36-mkgs
vulnerability_id VCID-tdwz-gg36-mkgs
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the encode() function in lib/helpers/AxiosURLSearchParams.js contains a character mapping (charMap) at line 21 that reverses the safe percent-encoding of null bytes. After encodeURIComponent('\x00') correctly produces the safe sequence %00, the charMap entry '%00': '\x00' converts it back to a raw null byte. Primary impact is limited because the standard axios request flow is not affected. This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42040
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08178
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42040
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42040
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-xhjh-pmcv-23jw
reference_id GHSA-xhjh-pmcv-23jw
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-27T13:48:02Z/
url https://github.com/axios/axios/security/advisories/GHSA-xhjh-pmcv-23jw
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42040
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tdwz-gg36-mkgs
9
url VCID-uuzj-ta8k-c3fn
vulnerability_id VCID-uuzj-ta8k-c3fn
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42039
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12828
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42039
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42039
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-62hf-57xw-28j9
reference_id GHSA-62hf-57xw-28j9
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-24T18:14:11Z/
url https://github.com/axios/axios/security/advisories/GHSA-62hf-57xw-28j9
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42039
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uuzj-ta8k-c3fn
10
url VCID-wbq8-z3qg-bfbt
vulnerability_id VCID-wbq8-z3qg-bfbt
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when responseType: 'stream' is used, Axios returns the response stream without enforcing maxContentLength. This bypasses configured response-size limits and allows unbounded downstream consumption. This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42036
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11627
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42036
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42036
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-vf2m-468p-8v99
reference_id GHSA-vf2m-468p-8v99
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-24T18:30:17Z/
url https://github.com/axios/axios/security/advisories/GHSA-vf2m-468p-8v99
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42036
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbq8-z3qg-bfbt
11
url VCID-z6xx-7p9v-gqc6
vulnerability_id VCID-z6xx-7p9v-gqc6
summary Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution to silently suppress all HTTP error responses (401, 403, 500, etc.), causing them to be treated as successful responses. This completely bypasses application-level authentication and error handling. The root cause is that validateStatus is the only config property using the mergeDirectKeys merge strategy, which uses JavaScript's in operator — an operator that inherently traverses the prototype chain. When Object.prototype.validateStatus is polluted with () => true, all HTTP status codes are accepted as success. This vulnerability is fixed in 1.15.1 and 0.31.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-42041
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12226
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-42041
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42041
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
reference_id 1134878
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134878
3
reference_url https://github.com/axios/axios/security/advisories/GHSA-w9j2-pvgh-6h63
reference_id GHSA-w9j2-pvgh-6h63
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-24T18:29:47Z/
url https://github.com/axios/axios/security/advisories/GHSA-w9j2-pvgh-6h63
fixed_packages
0
url pkg:deb/debian/node-axios@1.15.2-1
purl pkg:deb/debian/node-axios@1.15.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1
aliases CVE-2026-42041
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6xx-7p9v-gqc6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-axios@1.15.2-1