CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-69202
6.50.04%

The Shared Hallucination: Authorization Bypass in axios-cache-interceptor

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·6 min read·9 visits

PoC Available

Executive Summary (TL;DR)

The popular library 'axios-cache-interceptor' (< 1.11.1) failed to respect the HTTP 'Vary' header. This effectively treats authenticated responses as global public assets. If an Admin visits a page, the library caches it. If a Guest visits the same page immediately after, they get the Admin's cached view, bypassing backend authentication checks entirely.

A critical failure in cache key generation allows unprivileged users to inherit the sessions of privileged users in server-side implementations of axios-cache-interceptor.

Official Patches

axios-cache-interceptorGitHub Commit fixing the issue

Fix Analysis (1)

Technical Appendix

CVSS Score
6.5/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS Probability
0.04%
Top 100% most exploited

Affected Systems

Node.js Backend-for-Frontends (BFF)SSR Applications (Next.js/Nuxt.js using custom axios instances)API Proxies using axios-cache-interceptor

Affected Versions Detail

Product
Affected Versions
Fixed Version
axios-cache-interceptor
Arthur Fiorette
< 1.11.11.11.1
AttributeDetail
CWE IDCWE-524 (Sensitive Information in Cache)
Attack VectorNetwork (AV:N)
ImpactConfidentiality High, Authorization Bypass
CVSS Score6.5 (Medium)
Exploit StatusPoC Available (in unit tests)
Fix Version1.11.1

MITRE ATT&CK Mapping

T1557Adversary-in-the-Middle
Credential Access
T1213Data from Information Repositories
Collection
CWE-524
Information Disclosure via Cache

Use of Cache Containing Sensitive Information

Known Exploits & Detection

GitHubIntegration tests demonstrating cache collision fixes for Vary headers

Vulnerability Timeline

Patch Committed
2025-02-12
GHSA Advisory Published
2025-02-14

References & Sources

  • [1]GHSA-x4m5-4cw8-vc44
  • [2]NVD Entry

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.