You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /interaction-content-delete/package.json
Path to vulnerable library: /interaction-content-delete/node_modules/axios/package.json,/interaction-content-download/node_modules/axios/package.json
Dependency Hierarchy:
❌ axios-1.7.7.tgz (Vulnerable Library)
Found in base branch: master
Vulnerability Details
axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.
mend-for-github.ghproxy.topbot
changed the title
axios-1.7.7.tgz: 1 vulnerabilities (highest severity is: 0.0)
axios-1.7.7.tgz: 1 vulnerabilities (highest severity is: 0.0) - autoclosed
Feb 12, 2025
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
mend-for-github.ghproxy.topbot
changed the title
axios-1.7.7.tgz: 1 vulnerabilities (highest severity is: 0.0) - autoclosed
axios-1.7.7.tgz: 1 vulnerabilities (highest severity is: 5.5)
Mar 10, 2025
mend-for-github.ghproxy.topbot
changed the title
axios-1.7.7.tgz: 1 vulnerabilities (highest severity is: 5.5)
axios-1.7.7.tgz: 1 vulnerabilities (highest severity is: 7.5)
Mar 10, 2025
Promise based HTTP client for the browser and node.js
Library home page: https://registry.npmjs.org/axios/-/axios-1.7.7.tgz
Path to dependency file: /interaction-content-delete/package.json
Path to vulnerable library: /interaction-content-delete/node_modules/axios/package.json,/interaction-content-download/node_modules/axios/package.json
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - axios-1.7.7.tgz
Promise based HTTP client for the browser and node.js
Library home page: https://registry.npmjs.org/axios/-/axios-1.7.7.tgz
Path to dependency file: /interaction-content-delete/package.json
Path to vulnerable library: /interaction-content-delete/node_modules/axios/package.json,/interaction-content-download/node_modules/axios/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.
Publish Date: 2025-03-07
URL: CVE-2025-27152
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-jr5f-v2jv-69x6
Release Date: 2025-03-07
Fix Resolution: 1.8.2
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: