No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Follow-redirects
Follow-redirects follow Redirects |
|
| Vendors & Products |
Follow-redirects
Follow-redirects follow Redirects |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. Prior to 1.16.0, when an HTTP request follows a cross-domain redirect (301/302/307/308), follow-redirects only strips authorization, proxy-authorization, and cookie headers (matched by regex at index.js). Any custom authentication header (e.g., X-API-Key, X-Auth-Token, Api-Key, Token) is forwarded verbatim to the redirect target. This vulnerability is fixed in 1.16.0. | |
| Title | follow-redirects: Custom Authentication Headers Leaked to Cross-Domain Redirect Targets | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T13:31:34.652Z
Reserved: 2026-04-15T16:37:22.766Z
Link: CVE-2026-40895
Updated: 2026-04-22T13:31:23.606Z
Status : Awaiting Analysis
Published: 2026-04-21T21:16:44.337
Modified: 2026-04-22T21:24:26.997
Link: CVE-2026-40895
No data.
OpenCVE Enrichment
Updated: 2026-04-22T06:45:10Z