chore(deps): bump axios from 1.15.0 to 1.15.2#5882
Merged
Conversation
Bumps [axios](https://github.com/axios/axios) from 1.15.0 to 1.15.2. - [Release notes](https://github.com/axios/axios/releases) - [Changelog](https://github.com/axios/axios/blob/v1.x/CHANGELOG.md) - [Commits](axios/axios@v1.15.0...v1.15.2) --- updated-dependencies: - dependency-name: axios dependency-version: 1.15.2 dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
rtibblesbot
approved these changes
May 8, 2026
Contributor
rtibblesbot
left a comment
There was a problem hiding this comment.
Dependency Update Review
Package: axios 1.15.0 → 1.15.2
Semver risk: Patch (spans two releases: 1.15.1 and 1.15.2)
Dependency type: production
CI status: All checks passing (linting, frontend build, frontend tests)
Changelog Analysis
Sources consulted:
- PR body (release notes for v1.15.1 and v1.15.2 from axios GitHub releases)
Breaking changes: None found in either release.
Security fixes:
- v1.15.2: Prototype pollution hardening in HTTP adapter and
resolveConfig/mergeConfig/validator paths — reads only own properties and uses null-prototype config objects (#10779) - v1.15.2: SSRF via
socketPath— rejects non-string values, adds opt-inallowedSocketPathsallowlist (#10777) - v1.15.2: Supply-chain hardening —
.npmrcwithignore-scripts=true, lockfile lint CI, scoped CODEOWNERS (#10776) - v1.15.1: Header injection hardening (#10749)
- v1.15.1: CRLF stripping in multipart headers (#10758)
- v1.15.1: Prototype pollution / auth bypass via unsafe
inchecks replaced withhasOwnProperty(#10761, #10760) - v1.15.1:
withXSRFTokentruthy bypass closing silent cross-origin token leakage (#10762) - v1.15.1:
maxBodyLengthenforcement withmaxRedirects: 0(#10753) - v1.15.1: Streamed response
maxContentLengthbypass (#10754) - v1.15.1: Follow-up CVE completion (#10755)
Bug fixes:
- v1.15.2: Keep-alive socket memory leak (per-request listener accumulation causing
MaxListenersExceededWarningand heap growth) (#10788) - v1.15.1: FormData handling, progress event clamping, type fixes
Compatibility Assessment
- No breaking changes in either release
- No new peer dependency requirements
- No code changes required beyond the lockfile
- All CI checks passing
Recommendation
Approve — security-focused patch releases addressing multiple prototype pollution, header injection, and SSRF vectors. No breaking changes; all CI passing.
@rtibblesbot's comments are generated by an LLM, and should be evaluated accordingly
How was this generated?
Reviewed the pull request diff checking for:
- Correctness: bugs, edge cases, undocumented behavior, resource leaks, hardcoded values
- Design: unnecessary complexity, naming, readability, comment accuracy, redundant state
- Architecture: duplicated concerns, minimal interfaces, composition over inheritance
- Testing: behavior-based assertions, mocks only at hard boundaries, accurate coverage
- Completeness: missing dependencies, unupdated usages, i18n, accessibility, security
- Principles: DRY (same reason to change), SRP, Rule of Three (no premature abstraction)
- Checked CI status and linked issue acceptance criteria
- For UI changes: inspected screenshots for layout, visual completeness, and consistency
rtibbles
approved these changes
May 8, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps axios from 1.15.0 to 1.15.2.
Release notes
Sourced from axios's releases.
... (truncated)
Changelog
Sourced from axios's changelog.
... (truncated)
Commits
5829343chore(release): prepare release 1.15.2 (#10789)4709a48fix: added fix for memory leak in sockets (#10788)be33360chore: update changelog (#10781)4791514fix: more header pollutions (#10779)6feafcffix: socket issue (#10777)302e273docs: update docs, add a couple actions etc (#10776)ac42446chore(release): prepare release 1.15.1 (#10767)908f220docs: update threatmodel (#10765)f93f815docs: added docs around potential decompressions bomb (#10763)1728aa1fix: short-circuits on any truthy non-boolean in withXSRFToken (#10762)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.