Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 25 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-212 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 23 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Follow-redirects Project
Follow-redirects Project follow-redirects |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:follow-redirects_project:follow-redirects:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Follow-redirects Project
Follow-redirects Project follow-redirects |
|
| Metrics |
cvssV3_1
|
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Follow-redirects
Follow-redirects follow Redirects |
|
| Vendors & Products |
Follow-redirects
Follow-redirects follow Redirects |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. Prior to 1.16.0, when an HTTP request follows a cross-domain redirect (301/302/307/308), follow-redirects only strips authorization, proxy-authorization, and cookie headers (matched by regex at index.js). Any custom authentication header (e.g., X-API-Key, X-Auth-Token, Api-Key, Token) is forwarded verbatim to the redirect target. This vulnerability is fixed in 1.16.0. | |
| Title | follow-redirects: Custom Authentication Headers Leaked to Cross-Domain Redirect Targets | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T13:31:34.652Z
Reserved: 2026-04-15T16:37:22.766Z
Link: CVE-2026-40895
Updated: 2026-04-22T13:31:23.606Z
Status : Analyzed
Published: 2026-04-21T21:16:44.337
Modified: 2026-04-23T15:54:31.857
Link: CVE-2026-40895
OpenCVE Enrichment
Updated: 2026-04-29T00:30:16Z