The Shared Hallucination: Authorization Bypass in axios-cache-interceptor
Vulnerability ID: CVE-2025-69202
CVSS Score: 6.5
Published: 2025-12-30
A critical failure in cache key generation allows unprivileged users to inherit the sessions of privileged users in server-side implementations of axios-cache-interceptor.
TL;DR
The popular library 'axios-cache-interceptor' (< 1.11.1) failed to respect the HTTP 'Vary' header. This effectively treats authenticated responses as global public assets. If an Admin visits a page, the library caches it. If a Guest visits the same page immediately after, they get the Admin's cached view, bypassing backend authentication checks entirely.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-524 (Sensitive Information in Cache)
- Attack Vector: Network (AV:N)
- Impact: Confidentiality High, Authorization Bypass
- CVSS Score: 6.5 (Medium)
- Exploit Status: PoC Available (in unit tests)
- Fix Version: 1.11.1
Affected Systems
- Node.js Backend-for-Frontends (BFF)
- SSR Applications (Next.js/Nuxt.js using custom axios instances)
- API Proxies using axios-cache-interceptor
-
axios-cache-interceptor: < 1.11.1 (Fixed in:
1.11.1)
Code Analysis
Commit: 49a8080
fix: add vary header support to key generator
ts
+ const vary = response.headers[headerNames.vary] || response.headers['vary'];
+ if (vary) { ... }
Exploit Details
- GitHub: Integration tests demonstrating cache collision fixes for Vary headers
Mitigation Strategies
- Update to version 1.11.1+
- Disable caching for authenticated routes if patching is impossible
- Implement custom key generators that explicitly hash the Authorization header
Remediation Steps:
- Run
npm install axios-cache-interceptor@latestoryarn upgrade axios-cache-interceptor. - Review codebase for custom
generateKeyfunctions that might override the new default safe behavior. - Verify the fix by sending concurrent requests with different Auth tokens to the same endpoint and asserting unique responses.
References
Read the full report for CVE-2025-69202 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)