JustAppSec
Back to news

Axios patches header injection gadget enabling IMDSv2 cloud credential theft

2 min readPublished 10 Apr 2026Updated 10 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — A Critical Axios “gadget chain” can let attackers smuggle injected HTTP headers and pivot SSRF into AWS IMDSv2 token/credential theft, risking full cloud compromise in affected services.

What happened

axios is a widely used HTTP client library for JavaScript (Node.js and browsers). CVE-2026-40175 describes a Critical issue where Axios can be used as a gadget to escalate prototype pollution elsewhere in the dependency tree into higher-impact outcomes, including remote code execution (RCE) or full cloud compromise via an AWS IMDSv2 bypass.

The CVE record ties this to a header-processing chain (CRLF/header injection leading into request smuggling/SSRF behaviors). It is scored CVSS v3.1 10.0 (Critical).

ItemSource value
Affected softwareaxios (npm)
ImpactEscalation chain to RCE or cloud compromise (AWS IMDSv2 bypass)
SeverityCVSS v3.1 10.0 (Critical)
Affected versions (CVE record)axios < 1.15.0
Fixed version (CVE record)1.15.0

Why it matters: this is an example of a modern, high-leverage dependency-chain failure mode — an app may “only” have a prototype pollution primitive in one library, but a ubiquitous HTTP client can turn that into cross-boundary request injection and cloud credential exposure.

Who is impacted

  • Any project that depends on axios in the CVE record’s affected range (< 1.15.0).
  • Higher-risk server-side deployments where application outbound HTTP can reach sensitive internal endpoints (e.g., cloud metadata services).
  • Stacks where any other dependency can provide a prototype pollution primitive (the CVE record explicitly frames Axios as an escalation gadget when pollution occurs elsewhere).

What to do now

  • Follow vendor remediation guidance and apply a release containing the fix (the CVE record states the vulnerability is fixed in 1.15.0).
  • Identify production services that import axios (directly or transitively) and confirm the deployed version from lockfiles, bundled artifacts, and container images.
  • Treat this as a cloud-credential exposure risk for server-side workloads: review whether affected services can reach instance metadata endpoints and rotate any credentials that would be exposed if metadata could be queried from that runtime.
  • If you suspect exploitation, review outbound HTTP telemetry for anomalous requests originating from application runtimes that should not be interacting with metadata or other internal control-plane endpoints.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.