Bug 2394735 (CVE-2025-58754) - CVE-2025-58754 axios: Axios DoS via lack of data size check
Summary: CVE-2025-58754 axios: Axios DoS via lack of data size check
Keywords:
Status: NEW
Alias: CVE-2025-58754
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2394856 2394857 2394858 2394859 2394860 2394861 2394862 2394863 2394864 2394865 2394866 2394867 2394868 2394869 2394870 2395838
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-09-12 02:01 UTC by OSIDB Bzimport
Modified: 2025-09-16 16:24 UTC (History)
113 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-09-12 02:01:17 UTC
Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to version 1.11.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Version 1.11.0 contains a patch for the issue.


Note You need to log in before you can comment on or make changes to this bug.