CVE-2025-58754

NameCVE-2025-58754
DescriptionAxios is a promise based HTTP client for the browser and Node.js. When Axios prior to version 1.11.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Version 1.11.0 contains a patch for the issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1114963

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-axios (PTS)bullseye0.21.1+dfsg-1+deb11u1vulnerable
bookworm1.2.1+dfsg-1+deb12u1vulnerable
trixie1.8.4+dfsg-1vulnerable
forky, sid1.11.0+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-axiossource(unstable)(unfixed)1114963

Notes

[trixie] - node-axios <no-dsa> (Minor issue)
[bookworm] - node-axios <no-dsa> (Minor issue)
https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj
https://github.com/axios/axios/pull/7011
https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593 (v1.12.0)

Search for package or bug name: Reporting problems