{"id":"CVE-2026-25639","summary":"Axios affected by Denial of Service via __proto__ Key in mergeConfig","details":"Axios is a promise based HTTP client for the browser and Node.js. Prior to versions 0.30.3 and 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in versions 0.30.3 and 1.13.5.","aliases":["GHSA-43fc-jf86-j433"],"modified":"2026-03-20T12:48:08.058961Z","published":"2026-02-09T20:11:22.374Z","related":["CGA-7wf9-6qpg-mv6m"],"database_specific":{"cwe_ids":["CWE-754"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25639.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/axios/axios/releases/tag/v0.30.3"},{"type":"WEB","url":"https://github.com/axios/axios/releases/tag/v1.13.5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25639.json"},{"type":"ADVISORY","url":"https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25639"},{"type":"FIX","url":"https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57"},{"type":"FIX","url":"https://github.com/axios/axios/commit/d7ff1409c68168d3057fc3891f911b2b92616f9e"},{"type":"FIX","url":"https://github.com/axios/axios/pull/7369"},{"type":"FIX","url":"https://github.com/axios/axios/pull/7388"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/axios/axios","events":[{"introduced":"484aa4fe6addccbd32206a31eb3d2d000843066e"},{"fixed":"29f75425f0c9f73021f5eedc869c176e30e05fe7"}],"database_specific":{"versions":[{"introduced":"1.0.0"},{"fixed":"1.13.5"}]}},{"type":"GIT","repo":"https://github.com/axios/axios","events":[{"introduced":"0"},{"fixed":"f53bcf6c3747652c9d3811dc0bbcd3674e21567a"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.30.3"}]}}],"versions":["0.19.1","0.21.3","1.2.0-alpha.1","1.2.2","v0.1.0","v0.10.0","v0.11.0","v0.11.1","v0.12.0","v0.13.0","v0.13.1","v0.14.0","v0.15.0","v0.15.1","v0.15.2","v0.15.3","v0.16.0","v0.16.1","v0.16.2","v0.17.0","v0.17.1","v0.18.0","v0.19.0","v0.19.0-beta.1","v0.19.1","v0.19.2","v0.2.0","v0.2.1","v0.2.2","v0.20.0","v0.20.0-0","v0.21.0","v0.21.2","v0.23.0","v0.24.0","v0.25.0","v0.26.0","v0.26.1","v0.27.0","v0.27.1","v0.27.2","v0.28.0","v0.28.1","v0.29.0","v0.3.0","v0.3.1","v0.30.0","v0.30.1","v0.30.2","v0.4.0","v0.4.1","v0.4.2","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.6.0","v0.7.0","v0.8.0","v0.8.1","v0.9.0","v0.9.1","v1.0.0","v1.1.0","v1.1.1","v1.1.2","v1.1.3","v1.10.0","v1.11.0","v1.12.0","v1.12.1","v1.12.2","v1.13.0","v1.13.1","v1.13.2","v1.13.3","v1.13.4","v1.2.0","v1.2.1","v1.2.2","v1.2.3","v1.2.4","v1.2.5","v1.2.6","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.6","v1.4.0","v1.5.0","v1.5.1","v1.6.0","v1.6.1","v1.6.2","v1.6.3","v1.6.4","v1.6.5","v1.6.6","v1.6.7","v1.6.8","v1.7.0","v1.7.0-beta.0","v1.7.0-beta.1","v1.7.0-beta.2","v1.7.1","v1.7.2","v1.7.3","v1.7.4","v1.7.5","v1.7.6","v1.7.7","v1.7.8","v1.7.9","v1.8.0","v1.8.1","v1.8.2","v1.8.3","v1.8.4","v1.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-25639.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}