Miggo Logo

CVE-2025-54371: Withdrawn Advisory: Axios has Transitive Critical Vulnerability via form-data

7.5

CVSS Score
3.1

Basic Information

EPSS Score
-
CWE
-
Published
7/23/2025
Updated
7/24/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
axiosnpm= 1.10.01.11.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is not in the Axios codebase itself, but in a transitive dependency, form-data. The vulnerability lies in the form-data package's use of Math.random() for generating multipart boundaries, which is predictable. The fix applied to Axios was to update the form-data dependency from version 4.0.0 to 4.0.4 in package.json and package-lock.json. This is evident from the commit 53c1606737e2b8c541b5c1dc801180cda4313961. Since the flaw is not in Axios's own functions, no vulnerable functions from the axios package can be identified. The exploitation would occur when an application uses axios to send multipart form data, which in turn calls the vulnerable code within the form-data library. Without analyzing the form-data package's source code, it is not possible to identify the specific vulnerable function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Wit**r*wn **visory T*is **visory **s ***n wit**r*wn ****us* us*rs o* *xios *.**.* **v* t** *l*xi*ility to us* * p*t**** v*rsion o* *orm-**t*, t** so*tw*r* in w*i** t** vuln*r**ility ori*in*t*s, wit*out up*r**in* *xios to ***r*ss **S*-*jxv-*rq*-**

Reasoning

T** vuln*r**ility is not in t** *xios *o****s* its*l*, *ut in * tr*nsitiv* **p*n**n*y, `*orm-**t*`. T** vuln*r**ility li*s in t** `*orm-**t*` p**k***'s us* o* `M*t*.r*n*om()` *or **n*r*tin* multip*rt *oun**ri*s, w*i** is pr**i*t**l*. T** *ix *ppli**