Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3376 articles · 142302 vulns · 36/41 feeds (7d)
← Back to list
4.8
CVE-2026-42041EXPLOITEDPATCHED
axios · axios

Axios: Authentication Bypass via Prototype Pollution Gadget in `validateStatus` Merge Strategy

Description

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution to silently suppress all HTTP error responses (401, 403, 500, etc.), causing them to be treated as successful responses. This completely bypasses application-level authentication and error handling. The root cause is that validateStatus is the only config property using the mergeDirectKeys merge strategy, which uses JavaScript's in operator — an operator that inherently traverses the prototype chain. When Object.prototype.validateStatus is polluted with () => true, all HTTP status codes are accepted as success. This vulnerability is fixed in 1.15.1 and 0.31.1.

Affected Products

VendorProductVersions
axiosaxiosnpm/axios: >= 1.0.0, < 1.15.1, npm/axios: <= 0.31.0

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
ibmapp connect enterprisecert_advisory90%
npmaxiosGHSA85%

References

  • https://github.com/axios/axios/security/advisories/GHSA-w9j2-pvgh-6h63(x_refsource_CONFIRM)

Related News (2 articles)

Tier B
BSI Advisories12h ago
[NEU] [mittel] IBM App Connect Enterprise (Axios): Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB17d ago
CVE-2026-42041 | Axios up to 0.31.0/1.15.0 improper authentication (GHSA-w9j2-pvgh-6h63)
→ No new info (linked only)
CVSS 3.14.8 MEDIUM
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
axios@1.15.1axios@0.31.1
CWECWE-287, CWE-1321
PublishedApr 24, 2026
Last enriched17d agov2
Trending Score59
Source articles2
Independent2
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

MEDIUMCVE-2026-42034EXP
Axios: HTTP adapter streamed uploads bypass maxBodyLength when maxRedirects: 0
Trending: 68
HIGHCVE-2026-42035EXP
Axios: Header Injection via Prototype Pollution
Trending: 67
HIGHCVE-2026-42033EXP
Axios: Prototype Pollution Gadgets - Response Tampering, Data Exfiltration, and Request Hijacking
Trending: 67
MEDIUMCVE-2026-42038EXP
Axios: no_proxy bypass via IP alias allows SSRF
Trending: 59
MEDIUMCVE-2026-42044EXP
Axios: Invisible JSON Response Tampering via Prototype Pollution Gadget in `parseReviver`
Trending: 59

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 24, 2026
Discovered by ZDM
Apr 24, 2026
Updated: severity, activelyExploited
Apr 24, 2026
Actively Exploited
Apr 24, 2026
Patch Available
Apr 24, 2026

Version History

v2
Last enriched 17d ago
v2Tier C17d ago

Updated severity to CRITICAL and marked the vulnerability as actively exploited.

severityactivelyExploited
via VulDB
v117d ago

Initial creation