Jan 1, 2026·6 min read·9 visits
The popular library 'axios-cache-interceptor' (< 1.11.1) failed to respect the HTTP 'Vary' header. This effectively treats authenticated responses as global public assets. If an Admin visits a page, the library caches it. If a Guest visits the same page immediately after, they get the Admin's cached view, bypassing backend authentication checks entirely.
A critical failure in cache key generation allows unprivileged users to inherit the sessions of privileged users in server-side implementations of axios-cache-interceptor.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N| Product | Affected Versions | Fixed Version |
|---|---|---|
axios-cache-interceptor Arthur Fiorette | < 1.11.1 | 1.11.1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-524 (Sensitive Information in Cache) |
| Attack Vector | Network (AV:N) |
| Impact | Confidentiality High, Authorization Bypass |
| CVSS Score | 6.5 (Medium) |
| Exploit Status | PoC Available (in unit tests) |
| Fix Version | 1.11.1 |
Use of Cache Containing Sensitive Information