CVE-2026-21697: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in rezmoss axios4go
axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue.
AI Analysis
Technical Summary
CVE-2026-21697 identifies a race condition vulnerability (CWE-362) in the axios4go Go HTTP client library versions before 0.6.4. The vulnerability stems from the global defaultClient object being mutated concurrently without proper synchronization during HTTP request execution. Specifically, the shared http.Client's Transport, Timeout, and CheckRedirect properties are modified during concurrent requests initiated by multiple goroutines (e.g., via GetAsync or PostAsync methods). This unsynchronized mutation can cause data races leading to inconsistent or incorrect HTTP client behavior, such as leaking proxy configurations or authentication credentials between requests. Applications that use axios4go in concurrent environments with different proxy settings or sensitive data are particularly vulnerable. The flaw can compromise confidentiality by exposing tokens, API keys, or credentials across requests. The vulnerability is remotely exploitable without authentication or user interaction, as it occurs during normal concurrent HTTP client usage. The issue was addressed in axios4go version 0.6.4 by introducing proper synchronization mechanisms to protect shared client configuration during concurrent access. No known exploits are currently reported in the wild, but the high CVSS 8.2 score reflects the significant risk posed by this race condition in multi-threaded applications.
Potential Impact
For European organizations, the vulnerability poses a significant risk to confidentiality and integrity of sensitive data transmitted via HTTP clients in Go applications. Organizations using axios4go in microservices, APIs, or backend systems that handle authentication tokens, API keys, or proxy configurations concurrently may experience data leakage or request tampering. This can lead to unauthorized access, data breaches, or service disruption. The impact is heightened in sectors like finance, healthcare, and government where sensitive data protection is critical. Additionally, the vulnerability could undermine trust in internal or external APIs and complicate compliance with GDPR and other data protection regulations. Since exploitation requires no authentication or user interaction, attackers could remotely trigger concurrent requests to exploit the race condition. The lack of known exploits currently provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
1. Upgrade axios4go to version 0.6.4 or later immediately to ensure the race condition is fixed. 2. Audit all Go applications using axios4go to identify concurrent HTTP client usage patterns, especially where different proxy or authentication configurations are applied per request. 3. Refactor code to avoid sharing mutable global HTTP client configurations across goroutines without proper synchronization primitives such as mutexes or by using separate client instances per configuration. 4. Implement rigorous testing for concurrent request handling to detect race conditions using Go's race detector tool. 5. Monitor application logs for anomalies in HTTP client behavior or unexpected credential exposure. 6. Educate development teams on safe concurrent programming practices in Go, emphasizing immutable or properly synchronized shared state. 7. Review and tighten access controls and network segmentation to limit exposure of vulnerable services until patched. 8. Maintain an inventory of all internal and third-party Go libraries to quickly identify and remediate similar concurrency issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2026-21697: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in rezmoss axios4go
Description
axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-21697 identifies a race condition vulnerability (CWE-362) in the axios4go Go HTTP client library versions before 0.6.4. The vulnerability stems from the global defaultClient object being mutated concurrently without proper synchronization during HTTP request execution. Specifically, the shared http.Client's Transport, Timeout, and CheckRedirect properties are modified during concurrent requests initiated by multiple goroutines (e.g., via GetAsync or PostAsync methods). This unsynchronized mutation can cause data races leading to inconsistent or incorrect HTTP client behavior, such as leaking proxy configurations or authentication credentials between requests. Applications that use axios4go in concurrent environments with different proxy settings or sensitive data are particularly vulnerable. The flaw can compromise confidentiality by exposing tokens, API keys, or credentials across requests. The vulnerability is remotely exploitable without authentication or user interaction, as it occurs during normal concurrent HTTP client usage. The issue was addressed in axios4go version 0.6.4 by introducing proper synchronization mechanisms to protect shared client configuration during concurrent access. No known exploits are currently reported in the wild, but the high CVSS 8.2 score reflects the significant risk posed by this race condition in multi-threaded applications.
Potential Impact
For European organizations, the vulnerability poses a significant risk to confidentiality and integrity of sensitive data transmitted via HTTP clients in Go applications. Organizations using axios4go in microservices, APIs, or backend systems that handle authentication tokens, API keys, or proxy configurations concurrently may experience data leakage or request tampering. This can lead to unauthorized access, data breaches, or service disruption. The impact is heightened in sectors like finance, healthcare, and government where sensitive data protection is critical. Additionally, the vulnerability could undermine trust in internal or external APIs and complicate compliance with GDPR and other data protection regulations. Since exploitation requires no authentication or user interaction, attackers could remotely trigger concurrent requests to exploit the race condition. The lack of known exploits currently provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
1. Upgrade axios4go to version 0.6.4 or later immediately to ensure the race condition is fixed. 2. Audit all Go applications using axios4go to identify concurrent HTTP client usage patterns, especially where different proxy or authentication configurations are applied per request. 3. Refactor code to avoid sharing mutable global HTTP client configurations across goroutines without proper synchronization primitives such as mutexes or by using separate client instances per configuration. 4. Implement rigorous testing for concurrent request handling to detect race conditions using Go's race detector tool. 5. Monitor application logs for anomalies in HTTP client behavior or unexpected credential exposure. 6. Educate development teams on safe concurrent programming practices in Go, emphasizing immutable or properly synchronized shared state. 7. Review and tighten access controls and network segmentation to limit exposure of vulnerable services until patched. 8. Maintain an inventory of all internal and third-party Go libraries to quickly identify and remediate similar concurrency issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-02T18:45:27.397Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695ee0db07b8a419a74d164c
Added to database: 1/7/2026, 10:40:27 PM
Last enriched: 1/14/2026, 11:42:10 PM
Last updated: 2/7/2026, 6:50:53 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.