axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rezmoss
Rezmoss axios4go |
|
| CPEs | cpe:2.3:a:rezmoss:axios4go:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Rezmoss
Rezmoss axios4go |
|
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue. | |
| Title | axios4go's Race Condition in Shared HTTP Client Allows Proxy Configuration Leak | |
| Weaknesses | CWE-362 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-08T20:37:17.978Z
Reserved: 2026-01-02T18:45:27.397Z
Link: CVE-2026-21697
Updated: 2026-01-08T20:37:12.742Z
Status : Analyzed
Published: 2026-01-07T23:15:50.533
Modified: 2026-03-09T13:57:52.080
Link: CVE-2026-21697
No data.