A critical vulnerability, CVE-2026-40175, has been disclosed in the widely used Axios npm package, a JavaScript library with millions of weekly downloads. The flaw has been assigned a CVSS score of 10.0, reflecting its maximum severity. It is a Server-Side Request Forgery (SSRF) vulnerability that can be escalated by an unauthenticated, remote attacker to achieve Remote Code Execution (RCE). The release of a public proof-of-concept (PoC) exploit demonstrates a viable attack chain for compromising cloud environments by stealing credentials from metadata services. This represents a severe Supply Chain Attack risk, and all developers using affected versions of Axios must upgrade immediately.
The vulnerability is a complex chain of weaknesses:
HTTP Response Splitting: The core issue lies in lib/adapters/http.js, where Axios improperly handles header values. An attacker can provide a header containing carriage return and line feed (CRLF) characters (\r\n). Axios merges this into an outbound HTTP request, allowing the attacker to "split" the response and inject arbitrary content or headers (T1197).
Prototype Pollution: The SSRF can be chained with a separate prototype pollution vulnerability in a third-party dependency used by the application. This allows the attacker to modify the prototype of base objects in the JavaScript environment.
Gadget Attack Chain: The combination of these flaws creates a "Gadget Attack Chain." An attacker can use the SSRF to make the server send a request to a malicious endpoint. The crafted response from this endpoint then exploits the prototype pollution to execute code or manipulate the application's logic. The public PoC demonstrates using this chain to bypass AWS IMDSv2 protections and exfiltrate sensitive cloud credentials.
Given that Axios is one of the most popular JavaScript libraries, the number of affected web applications and services is potentially in the millions.
A public proof-of-concept (PoC) exploit has been released. While there are no confirmed reports of widespread active exploitation yet, the availability of a PoC dramatically lowers the bar for attackers and makes exploitation imminent.
The impact is critical (CVSS 10.0). A successful exploit allows an unauthenticated attacker to:
| Type | Value | Description |
|---|---|---|
| log_source | Application Logs | Look for malformed or unexpected headers in requests being processed by Axios. Specifically, search for \r\n or %0d%0a characters in header values. |
| network_traffic_pattern | Outbound requests from application servers to unexpected internal or external IPs. | An indicator of SSRF, where the server is forced to make a request on the attacker's behalf. |
| url_pattern | http://169.254.169.254/ |
Monitor for requests from application servers to cloud metadata service endpoints, which is a classic SSRF target. |
npm update axios or yarn upgrade axios and redeploy your applications.Updating the Axios library to a non-vulnerable version is the most critical and effective mitigation.
Mapped D3FEND Techniques:
Implementing strict egress filtering on application servers to block connections to cloud metadata endpoints can prevent the theft of credentials via SSRF.
Mapped D3FEND Techniques:
Running applications in sandboxed or containerized environments with minimal privileges and strict network policies can limit the impact of an RCE.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats