Impact
The CVE description explains that a prototype‑pollution flaw in any third‑party dependency can be escalated through a Gadget chain in Axios, potentially leading to remote code execution or full cloud compromise via an AWS IMDSv2 bypass. The specific code paths involve HTTP header manipulation, suggesting that header injection may be part of the attack, although this is inferred rather than explicitly stated. Based on the listed CWEs—CWE‑113, CWE‑444, CWE‑915, and CWE‑918—the vulnerability allows the attacker to manipulate global objects, inject malicious headers, and possibly execute arbitrary code with the process's privileges. Additionally, the chain bypasses IMDSv2, enabling cloud metadata exfiltration.
Affected Systems
Axios, the popular promise‑based HTTP client for Node.js and browsers, is affected. The library versions before 1.15.0 for Node and before 0.3.1 for browser clients contain the flaw. Updating to 1.15.0 or 0.3.1 removes the vulnerable code paths.
Risk and Exploitability
The CVSS vector scores the issue at 4.8, reflecting a moderate‑impact, remotely exploitable flaw. The EPSS score is below 1%, suggesting that while exploitation is possible, it is not yet widespread. The vulnerability is not listed in the CISA KEV catalog, but its potential for cloud breach and full RCE warrants urgent action. It is inferred that exploitation would likely involve inserting malicious library code that triggers prototype‑polluted libraries and sending crafted headers to execute arbitrary code or bypass IMDSv2.
OpenCVE Enrichment
Github GHSA