CVE-2025-27152 (Medium) Detected In Axios-0.21.2.tgz
Introduction
The world of open-source software is a double-edged sword. On one hand, it provides developers with a vast array of free and reusable code, accelerating the development process and reducing costs. On the other hand, it also introduces a significant risk of security vulnerabilities, as anyone can contribute to and modify the code. In this article, we will delve into the details of a recently discovered vulnerability, CVE-2025-27152, which affects the popular axios library.
CVE-2025-27152 - Medium Severity Vulnerability
axios-0.21.2.tgz, a promise-based HTTP client for the browser and node.js, has been found to contain a medium-severity vulnerability. This vulnerability occurs when passing absolute URLs rather than protocol-relative URLs to axios, potentially causing Server-Side Request Forgery (SSRF) and credential leakage. This issue impacts both server-side and client-side usage of axios.
Library Details
- Vulnerable Library: axios-0.21.2.tgz
- Library Home Page: https://registry.npmjs.org/axios/-/axios-0.21.2.tgz
- Path to Dependency File: /package.json
- Path to Vulnerable Library: /node_modules/axios/package.json
Dependency Hierarchy
- axios-0.21.2.tgz (Vulnerable Library)
- Found in base branch: dev
Vulnerability Details
The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if baseURL
is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.
- Publish Date: 2025-03-07
- URL: https://www.mend.io/vulnerability-database/CVE-2025-27152
CVSS 3 Score Details (5.5)
The CVSS 3 score for this vulnerability is 5.5, indicating a medium severity risk. The base score metrics are as follows:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
The suggested fix for this vulnerability is to upgrade the version of axios to 1.8.2 or later.
- Type: Upgrade version
- Release Date: 2025-03-07
- Fix Resolution: v1.8.2
Conclusion
The discovery of CVE-2025-27152 in axios-0.21.2.tgz highlights the importance of regular security audits and vulnerability scanning in open-source software. Developers and organizations must stay vigilant and take proactive measures to identify and address potential security risks. By upgrading to the latest version of axios, developers can ensure the security and integrity of their applications.
Step Up Your Open Source Security Game with Mend
To learn more about how to protect your open-source software from vulnerabilities like CVE-2025-27152, visit here.
CVE-2025-27152 (Medium) Detected in axios-0.21.2.tgz: A Threat to Open Source Security - Q&A
Introduction
In our previous article, we discussed the details of CVE-2025-27152, a medium-severity vulnerability detected in axios-0.21.2.tgz. This vulnerability has the potential to cause Server-Side Request Forgery (SSRF) and credential leakage, impacting both server-side and client-side usage of axios. In this article, we will answer some frequently asked questions about this vulnerability and provide guidance on how to protect your open-source software.
Q&A
Q: What is CVE-2025-27152?
A: CVE-2025-27152 is a medium-severity vulnerability detected in axios-0.21.2.tgz, a promise-based HTTP client for the browser and node.js. This vulnerability occurs when passing absolute URLs rather than protocol-relative URLs to axios, potentially causing SSRF and credential leakage.
Q: What is the impact of this vulnerability?
A: The impact of this vulnerability is significant, as it can cause SSRF and credential leakage, impacting both server-side and client-side usage of axios. This can lead to unauthorized access to sensitive data and systems.
Q: How can I identify if my application is affected by this vulnerability?
A: To identify if your application is affected by this vulnerability, you can check the version of axios being used. If you are using axios-0.21.2.tgz or earlier, you are likely affected by this vulnerability.
Q: What is the suggested fix for this vulnerability?
A: The suggested fix for this vulnerability is to upgrade the version of axios to 1.8.2 or later. This will ensure that your application is protected from the potential risks associated with this vulnerability.
Q: Can I fix this vulnerability by modifying the code?
A: While it is technically possible to modify the code to fix this vulnerability, it is not recommended. The best course of action is to upgrade to the latest version of axios, which has already been fixed.
Q: How can I prevent similar vulnerabilities in the future?
A: To prevent similar vulnerabilities in the future, it is essential to regularly update and patch your dependencies, including axios. You can also use tools like vulnerability scanners and code analyzers to identify potential security risks.
Q: What is the CVSS 3 score for this vulnerability?
A: The CVSS 3 score for this vulnerability is 5.5, indicating a medium severity risk.
Q: What are the base score metrics for this vulnerability?
A: The base score metrics for this vulnerability are as follows:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Conclusion
CVE-2025-27152 is a significant vulnerability that affects axios-0.21.2.tgz and earlier versions. It is essential to upgrade to the latest version of axios to protect your application from the potential risks associated with this vulnerability. By following the suggested fix and taking proactive measures to identify and address potential security risks, you can ensure the security and integrity of your open-source software.
Step Up Your Open Source Security Game with Mend
To learn more about how to protect your open-source software from vulnerabilities like CVE-2025-27152, visit here.