CVE-2025-69202

The Shared Hallucination: Authorization Bypass in axios-cache-interceptor

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·6 min read·6 visits

Executive Summary (TL;DR)

The popular library 'axios-cache-interceptor' (< 1.11.1) failed to respect the HTTP 'Vary' header. This effectively treats authenticated responses as global public assets. If an Admin visits a page, the library caches it. If a Guest visits the same page immediately after, they get the Admin's cached view, bypassing backend authentication checks entirely.

A critical failure in cache key generation allows unprivileged users to inherit the sessions of privileged users in server-side implementations of axios-cache-interceptor.

Fix Analysis (1)

Technical Appendix

CVSS Score
6.5/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS Probability
0.04%
Top 100% most exploited

Affected Systems

Node.js Backend-for-Frontends (BFF)SSR Applications (Next.js/Nuxt.js using custom axios instances)API Proxies using axios-cache-interceptor

Affected Versions Detail

Product
Affected Versions
Fixed Version
axios-cache-interceptor
Arthur Fiorette
< 1.11.11.11.1
AttributeDetail
CWE IDCWE-524 (Sensitive Information in Cache)
Attack VectorNetwork (AV:N)
ImpactConfidentiality High, Authorization Bypass
CVSS Score6.5 (Medium)
Exploit StatusPoC Available (in unit tests)
Fix Version1.11.1
CWE-524
Information Disclosure via Cache

Use of Cache Containing Sensitive Information

Vulnerability Timeline

Patch Committed
2025-02-12
GHSA Advisory Published
2025-02-14

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.