CVE-2026-40895 - Medium Severity Vulnerability
Vulnerable Library - follow-redirects-1.14.8.tgz
HTTP and HTTPS modules that follow redirects.
Library home page: https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.14.8.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/follow-redirects/package.json
Dependency Hierarchy:
- axios-0.21.4.tgz (Root Library)
- ❌ follow-redirects-1.14.8.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
follow-redirects is an open source, drop-in replacement for Node's "http" and "https" modules that automatically follows redirects. Prior to 1.16.0, when an HTTP request follows a cross-domain redirect (301/302/307/308), follow-redirects only strips authorization, proxy-authorization, and cookie headers (matched by regex at index.js). Any custom authentication header (e.g., X-API-Key, X-Auth-Token, Api-Key, Token) is forwarded verbatim to the redirect target. This vulnerability is fixed in 1.16.0.
Publish Date: 2026-04-21
URL: CVE-2026-40895
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-r4q5-vmmm-2653
Release Date: 2026-04-21
Fix Resolution (follow-redirects): 1.16.0
Direct dependency fix Resolution (axios): 0.22.0
Step up your Open Source Security Game with Mend here
CVE-2026-40895 - Medium Severity Vulnerability
HTTP and HTTPS modules that follow redirects.
Library home page: https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.14.8.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/follow-redirects/package.json
Dependency Hierarchy:
Found in base branch: main
follow-redirects is an open source, drop-in replacement for Node's "http" and "https" modules that automatically follows redirects. Prior to 1.16.0, when an HTTP request follows a cross-domain redirect (301/302/307/308), follow-redirects only strips authorization, proxy-authorization, and cookie headers (matched by regex at index.js). Any custom authentication header (e.g., X-API-Key, X-Auth-Token, Api-Key, Token) is forwarded verbatim to the redirect target. This vulnerability is fixed in 1.16.0.
Publish Date: 2026-04-21
URL: CVE-2026-40895
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: GHSA-r4q5-vmmm-2653
Release Date: 2026-04-21
Fix Resolution (follow-redirects): 1.16.0
Direct dependency fix Resolution (axios): 0.22.0
Step up your Open Source Security Game with Mend here