Bug 2460297 (CVE-2026-40895) - CVE-2026-40895 follow-redirects: follow-redirects: Information disclosure via cross-domain redirects
Summary: CVE-2026-40895 follow-redirects: follow-redirects: Information disclosure via...
Keywords:
Status: NEW
Alias: CVE-2026-40895
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-21 21:02 UTC by OSIDB Bzimport
Modified: 2026-05-07 11:15 UTC (History)
165 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-21 21:02:56 UTC
follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. Prior to 1.16.0, when an HTTP request follows a cross-domain redirect (301/302/307/308), follow-redirects only strips authorization, proxy-authorization, and cookie headers (matched by regex at index.js). Any custom authentication header (e.g., X-API-Key, X-Auth-Token, Api-Key, Token) is forwarded verbatim to the redirect target. This vulnerability is fixed in 1.16.0.


Note You need to log in before you can comment on or make changes to this bug.