Axios HTTP Client Security Alert: Critical CVEs Prompt Mandatory Update to v1
A critical security alert has been issued for the widely-used Axios HTTP client library, mandating an immediate update to version 1.x. The alert, triggered by automated dependency management, flags two significant vulnerabilities (CVE-2021-3749 and CVE-2023-45857) present in older versions. This is not a routine patch; it addresses a known regular expression flaw and a more recent, severe information disclosure bug that can leak sensitive XSRF tokens.
The core issue centers on Axios versions from 0.8.1 through 1.5.1. The CVE-2023-45857 vulnerability is particularly concerning as it can cause the library to inadvertently expose the confidential `XSRF-TOKEN` cookie value in outgoing requests. This flaw creates a direct pathway for potential cross-site request forgery attacks by revealing a key anti-CSRF defense mechanism. The automated pull request explicitly moves the dependency from the vulnerable `^0.21.0` range to the secure `^1.0.0` baseline, specifically version 1.15.0.
For any development team or project relying on Axios for API communication, this alert represents an urgent operational security task. The vulnerabilities are publicly documented in the National Vulnerability Database, increasing the risk of exploitation. Failure to apply this update leaves applications exposed to data leakage and potential compromise of user sessions. The update is a non-negotiable step to close a confirmed security gap in a foundational piece of modern web infrastructure.