{"api_version":"1","generated_at":"2026-05-08T10:59:25+00:00","cve":"CVE-2026-42264","urls":{"html":"https://cve.report/CVE-2026-42264","api":"https://cve.report/api/cve/CVE-2026-42264.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-42264","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-42264"},"summary":{"title":"Axios: Prototype pollution read-side gadgets in HTTP adapter allow credential injection and request hijacking","description":"Axios is a promise based HTTP client for the browser and Node.js. From version 1.0.0 to before version 1.15.2, fFive config properties (auth, baseURL, socketPath, beforeRedirect, and insecureHTTPParser) in the HTTP adapter are read via direct property access without hasOwnProperty guards, making them exploitable as prototype pollution gadgets. When Object.prototype is polluted by another dependency in the same process, axios silently picks up these polluted values on every outbound HTTP request. This issue has been patched in version 1.15.2.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-08 04:16:20","updated_at":"2026-05-08 04:16:20"},"problem_types":["CWE-1321","CWE-1321 CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"7.4","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.4","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","data":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/axios/axios/security/advisories/GHSA-q8qp-cvcw-x6jj","name":"https://github.com/axios/axios/security/advisories/GHSA-q8qp-cvcw-x6jj","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/axios/axios/releases/tag/v1.15.2","name":"https://github.com/axios/axios/releases/tag/v1.15.2","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/axios/axios/pull/10779","name":"https://github.com/axios/axios/pull/10779","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/axios/axios/commit/47915144662f2733e6c051bdcb895a8c8f0586aa","name":"https://github.com/axios/axios/commit/47915144662f2733e6c051bdcb895a8c8f0586aa","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-42264","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42264","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"axios","product":"axios","version":"affected >= 1.0.0, < 1.15.2","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"axios","vendor":"axios","versions":[{"status":"affected","version":">= 1.0.0, < 1.15.2"}]}],"descriptions":[{"lang":"en","value":"Axios is a promise based HTTP client for the browser and Node.js. From version 1.0.0 to before version 1.15.2, fFive config properties (auth, baseURL, socketPath, beforeRedirect, and insecureHTTPParser) in the HTTP adapter are read via direct property access without hasOwnProperty guards, making them exploitable as prototype pollution gadgets. When Object.prototype is polluted by another dependency in the same process, axios silently picks up these polluted values on every outbound HTTP request. This issue has been patched in version 1.15.2."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1321","description":"CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-08T03:20:24.248Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/axios/axios/security/advisories/GHSA-q8qp-cvcw-x6jj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/axios/axios/security/advisories/GHSA-q8qp-cvcw-x6jj"},{"name":"https://github.com/axios/axios/pull/10779","tags":["x_refsource_MISC"],"url":"https://github.com/axios/axios/pull/10779"},{"name":"https://github.com/axios/axios/commit/47915144662f2733e6c051bdcb895a8c8f0586aa","tags":["x_refsource_MISC"],"url":"https://github.com/axios/axios/commit/47915144662f2733e6c051bdcb895a8c8f0586aa"},{"name":"https://github.com/axios/axios/releases/tag/v1.15.2","tags":["x_refsource_MISC"],"url":"https://github.com/axios/axios/releases/tag/v1.15.2"}],"source":{"advisory":"GHSA-q8qp-cvcw-x6jj","discovery":"UNKNOWN"},"title":"Axios: Prototype pollution read-side gadgets in HTTP adapter allow credential injection and request hijacking"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-42264","datePublished":"2026-05-08T03:20:24.248Z","dateReserved":"2026-04-26T11:53:27.706Z","dateUpdated":"2026-05-08T03:20:24.248Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 04:16:20","lastModifiedDate":"2026-05-08 04:16:20","problem_types":["CWE-1321","CWE-1321 CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":5.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"42264","Ordinal":"1","Title":"Axios: Prototype pollution read-side gadgets in HTTP adapter all","CVE":"CVE-2026-42264","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"42264","Ordinal":"1","NoteData":"Axios is a promise based HTTP client for the browser and Node.js. From version 1.0.0 to before version 1.15.2, fFive config properties (auth, baseURL, socketPath, beforeRedirect, and insecureHTTPParser) in the HTTP adapter are read via direct property access without hasOwnProperty guards, making them exploitable as prototype pollution gadgets. When Object.prototype is polluted by another dependency in the same process, axios silently picks up these polluted values on every outbound HTTP request. This issue has been patched in version 1.15.2.","Type":"Description","Title":"Axios: Prototype pollution read-side gadgets in HTTP adapter all"}]}}}