๐Ÿ” CVE Alert

CVE-2025-62718

UNKNOWN 0.0

Axios has a NO_PROXY Hostname Normalization Bypass that Leads to SSRF

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
10th

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.31.0, Axios does not correctly handle hostname normalization when checking NO_PROXY rules. Requests to loopback addresses like localhost. (with a trailing dot) or [::1] (IPv6 literal) skip NO_PROXY matching and go through the configured proxy. This goes against what developers expect and lets attackers force requests through a proxy, even if NO_PROXY is set up to protect loopback or internal services. This issue leads to the possibility of proxy bypass and SSRF vulnerabilities allowing attackers to reach sensitive loopback or internal services despite the configured protections. This vulnerability is fixed in 1.15.0 and 0.31.0.

CWE CWE-441 CWE-918
Vendor axios
Product axios
Published Apr 9, 2026
Last Updated Apr 16, 2026
Stay Ahead of the Next One

Get instant alerts for axios axios

Be the first to know when new unknown vulnerabilities affecting axios axios are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

axios / axios
>= 1.0.0, < 1.15.0 < 0.31.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/axios/axios/security/advisories/GHSA-3p68-rc4w-qgx5 github.com: https://github.com/axios/axios/pull/10661 github.com: https://github.com/axios/axios/pull/10688 github.com: https://github.com/axios/axios/commit/03cdfc99e8db32a390e12128208b6778492cee9c github.com: https://github.com/axios/axios/commit/fb3befb6daac6cad26b2e54094d0f2d9e47f24df datatracker.ietf.org: https://datatracker.ietf.org/doc/html/rfc1034#section-3.1 datatracker.ietf.org: https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2 github.com: https://github.com/axios/axios/releases/tag/v0.31.0 github.com: https://github.com/axios/axios/releases/tag/v1.15.0