CVE-2025-58754

Axios · Axios (as used in Multiple Products)

A high-severity vulnerability has been identified in Axios, a widely used HTTP client library present in numerous web applications.

Executive summary

A high-severity vulnerability has been identified in Axios, a widely used HTTP client library present in numerous web applications. This flaw could allow a remote attacker to trick an application server into making unauthorized requests to internal network resources, potentially leading to sensitive information disclosure or further system compromise. Organizations are urged to apply vendor-provided security updates immediately to mitigate this risk.

Vulnerability

The vulnerability is a Server-Side Request Forgery (SSRF) flaw within the Axios library when used in a Node.js environment. An attacker can craft a specially designed URL and submit it to a web application that uses a vulnerable version of Axios to make server-side HTTP requests. Due to improper input validation, the Axios library can be manipulated into sending a request to an arbitrary URL chosen by the attacker, including internal network addresses or sensitive cloud metadata endpoints that are not typically accessible from the internet.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5, posing a significant risk to the organization. Successful exploitation could allow an attacker to bypass firewall rules and access internal, non-public services from the context of the vulnerable application server. Potential consequences include the exfiltration of sensitive data such as API keys and credentials from cloud metadata services, scanning of the internal network to map its topology, and interaction with sensitive internal applications, leading to data breaches, service disruption, and further lateral movement within the corporate network.

Remediation

Immediate Action: The primary remediation is to apply vendor security updates immediately. System administrators should identify all applications and systems utilizing the vulnerable Axios library and deploy the patched versions as a top priority. Following the update, security teams should monitor for exploitation attempts and review access logs for any anomalous outbound requests originating from application servers.

Proactive Monitoring: Monitor egress network traffic from application servers for connections to unusual internal IP addresses, ports, or known cloud metadata service endpoints (e.g., 169.254.169.254). Implement application-level logging to record all outbound requests made by the Axios client and review these logs for suspicious URLs or redirect patterns. Utilize a Web Application Firewall (WAF) to inspect incoming requests for patterns indicative of SSRF attacks.

Compensating Controls: If immediate patching is not feasible, implement strict egress filtering rules on the host and network firewalls to limit outbound connections from application servers to only known and trusted destinations. If possible, configure application environments to use a proxy for all outbound requests, which can enforce URL whitelisting. For cloud environments, restrict server instance permissions to prevent access to sensitive metadata endpoints.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.5) and the ubiquitous nature of the Axios library, this vulnerability presents a critical risk. Although it is not currently listed on the CISA KEV list, its potential for widespread impact is significant. We strongly recommend that organizations treat this as an urgent priority. The primary course of action must be to immediately initiate patching procedures across all identified systems to prevent potential exploitation.