Description
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.
Published: 2026-04-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Axios is a promise–based HTTP client used in browser and Node.js applications. In versions prior to 1.15.1 and 0.31.1, the toFormData routine performs an unbounded recursive walk of nested objects. A deeply nested request payload can cause the JavaScript engine to exhaust stack space and raise a RangeError, terminating the Node.js process. The primary impact is a denial of service: an attacker who can supply arbitrary request data to an Axios‑based client can trigger a crash that may bring down a service or host. This vulnerability is classified as CWE‑674, an unbounded recursion flaw, and also involves CWE‑770, a resource exhaustion issue. Mitigation requires preventing the unbounded recursion from executing against malicious data. The product’s maintainers have fixed the issue in the specified release versions.

Affected Systems

The affected vendor is Axios. All Axios releases prior to 1.15.1 and 0.31.1 are vulnerable. Applications that depend on these older Axios packages and send deeply nested data in HTTP requests are at risk.

Risk and Exploitability

The vulnerability has a CVSS score of 6.9, indicating moderate severity. Its EPSS score is less than 1%, signifying a low probability of exploitation in the wild. The CISA KEV catalog does not list it. Based on the description, the likely attack vector is through maliciously crafted HTTP requests that include deeply nested JSON objects sent to a service that uses Axios to process them. An attacker would need to control the request payload; if successful, the recursive traversal would trigger a RangeError, causing the Node.js process to crash and resulting in a denial of service.

Generated by OpenCVE AI on May 6, 2026 at 01:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Axios to at least 1.15.1 or 0.31.1
  • Implement input validation to limit the nesting depth of JSON payloads before calling Axios
  • Configure Node.js to restart crashed processes and allocate memory limits to mitigate impact of any remaining failures

Generated by OpenCVE AI on May 6, 2026 at 01:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-62hf-57xw-28j9 Axios: unbounded recursion in toFormData causes DoS via deeply nested request data
History

Wed, 06 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
References
Metrics threat_severity

None

threat_severity

Important


Mon, 27 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Axios
Axios axios
CPEs cpe:2.3:a:axios:axios:*:*:*:*:*:node.js:*:*
Vendors & Products Axios
Axios axios
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Description Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.
Title Axios: unbounded recursion in toFormData causes DoS via deeply nested request data
Weaknesses CWE-674
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-24T18:14:37.802Z

Reserved: 2026-04-23T16:05:01.709Z

Link: CVE-2026-42039

cve-icon Vulnrichment

Updated: 2026-04-24T18:14:31.935Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T18:16:30.827

Modified: 2026-04-27T19:50:46.320

Link: CVE-2026-42039

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-24T18:01:30Z

Links: CVE-2026-42039 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T01:30:15Z

Weaknesses