axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue.
History

Mon, 09 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Rezmoss
Rezmoss axios4go
CPEs cpe:2.3:a:rezmoss:axios4go:*:*:*:*:*:go:*:*
Vendors & Products Rezmoss
Rezmoss axios4go
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 08 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 22:45:00 +0000

Type Values Removed Values Added
Description axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue.
Title axios4go's Race Condition in Shared HTTP Client Allows Proxy Configuration Leak
Weaknesses CWE-362
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-01-07T22:29:57.393Z

Updated: 2026-01-08T20:37:17.978Z

Reserved: 2026-01-02T18:45:27.397Z

Link: CVE-2026-21697

cve-icon Vulnrichment

Updated: 2026-01-08T20:37:12.742Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-07T23:15:50.533

Modified: 2026-03-09T13:57:52.080

Link: CVE-2026-21697

cve-icon Redhat

No data.