Description
follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. Prior to 1.16.0, when an HTTP request follows a cross-domain redirect (301/302/307/308), follow-redirects only strips authorization, proxy-authorization, and cookie headers (matched by regex at index.js). Any custom authentication header (e.g., X-API-Key, X-Auth-Token, Api-Key, Token) is forwarded verbatim to the redirect target. This vulnerability is fixed in 1.16.0.
Published: 2026-04-21
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized disclosure of authentication credentials
Action: Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-212
References
Metrics threat_severity

None

threat_severity

Important


Thu, 23 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Follow-redirects Project
Follow-redirects Project follow-redirects
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:follow-redirects_project:follow-redirects:*:*:*:*:*:node.js:*:*
Vendors & Products Follow-redirects Project
Follow-redirects Project follow-redirects
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
First Time appeared Follow-redirects
Follow-redirects follow Redirects
Vendors & Products Follow-redirects
Follow-redirects follow Redirects

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. Prior to 1.16.0, when an HTTP request follows a cross-domain redirect (301/302/307/308), follow-redirects only strips authorization, proxy-authorization, and cookie headers (matched by regex at index.js). Any custom authentication header (e.g., X-API-Key, X-Auth-Token, Api-Key, Token) is forwarded verbatim to the redirect target. This vulnerability is fixed in 1.16.0.
Title follow-redirects: Custom Authentication Headers Leaked to Cross-Domain Redirect Targets
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Follow-redirects Follow Redirects
Follow-redirects Project Follow-redirects
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-22T13:31:34.652Z

Reserved: 2026-04-15T16:37:22.766Z

Link: CVE-2026-40895

cve-icon Vulnrichment

Updated: 2026-04-22T13:31:23.606Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-21T21:16:44.337

Modified: 2026-04-23T15:54:31.857

Link: CVE-2026-40895

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-21T19:59:59Z

Links: CVE-2026-40895 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T00:30:16Z