Description
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, he fix for no_proxy hostname normalization bypass is incomplete. When no_proxy=localhost is set, requests to 127.0.0.1 and [::1] still route through the proxy instead of bypassing it. The shouldBypassProxy() function does pure string matching — it does not resolve IP aliases or loopback equivalents. This vulnerability is fixed in 1.15.1 and 0.31.1.
Published: 2026-04-24
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Axios, a promise‑based HTTP client for Node.js and browsers, contains a server‑side request forgery flaw. The no_proxy hostname normalization logic performs only a pure string comparison and fails to resolve IP aliases or loopback equivalents, so when no_proxy=localhost is set, requests to 127.0.0.1 or ::1 are incorrectly routed through the proxy. This allows an attacker to force the client to send traffic from the application to internal services that are normally accessible only within the host, enabling data exfiltration or internal service exploitation. The vulnerability is a CWE‑918 type flaw involving improper handling of network request parameters and also relates to CWE‑1220, where third‑party functions are used in a context that can expose sensitive data.

Affected Systems

The axios library itself is affected; all releases older than 1.15.1 on the main line and older than 0.31.1 on the older major line are vulnerable. Any application that incorporates one of those releases and configures no_proxy to exclude localhost is at risk if it sends outbound requests through Axios.

Risk and Exploitability

The CVSS score of 6.8 indicates moderate severity, and the EPSS score of less than 1% suggests that active exploitation is currently rare. The vulnerability is not listed in the National Cyber Awareness System KEV catalog. Based on the description, it is inferred that an attacker would need the ability to influence the no_proxy configuration or supply a crafted URL that triggers the bypass; the flaw is exploitable in a server context without user interaction, making it a valid SSRF path to internal resources if the application relies on Axios for outbound traffic.

Generated by OpenCVE AI on April 29, 2026 at 21:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the axios package to version 1.15.1 or newer, or to 0.31.1 if using the older major line.
  • If an upgrade cannot be performed immediately, explicitly include the IP addresses 127.0.0.1 and ::1 in the no_proxy configuration or disable proxy usage for any requests intended for localhost.
  • Implement network‑level controls, such as firewall rules or proxy restrictions, that block or limit outgoing connections from the application process to local IP addresses to mitigate SSRF risk if a configuration change cannot be enforced.

Generated by OpenCVE AI on April 29, 2026 at 21:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m7pr-hjqh-92cm Axios: no_proxy bypass via IP alias allows SSRF
History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1220
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 27 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Axios
Axios axios
CPEs cpe:2.3:a:axios:axios:*:*:*:*:*:node.js:*:*
Vendors & Products Axios
Axios axios

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Description Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, he fix for no_proxy hostname normalization bypass is incomplete. When no_proxy=localhost is set, requests to 127.0.0.1 and [::1] still route through the proxy instead of bypassing it. The shouldBypassProxy() function does pure string matching — it does not resolve IP aliases or loopback equivalents. This vulnerability is fixed in 1.15.1 and 0.31.1.
Title Axios: no_proxy bypass via IP alias allows SSRF
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-27T13:46:32.484Z

Reserved: 2026-04-23T16:05:01.708Z

Link: CVE-2026-42038

cve-icon Vulnrichment

Updated: 2026-04-27T13:46:24.142Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T18:16:30.680

Modified: 2026-04-27T19:52:16.520

Link: CVE-2026-42038

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T17:57:26Z

Links: CVE-2026-42038 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T21:45:20Z

Weaknesses