Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21697: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in rezmoss axios4go

0
High
VulnerabilityCVE-2026-21697cvecve-2026-21697cwe-362
Published: Wed Jan 07 2026 (01/07/2026, 22:29:57 UTC)
Source: CVE Database V5
Vendor/Project: rezmoss
Product: axios4go

Description

axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue.

AI-Powered Analysis

AILast updated: 01/14/2026, 23:42:10 UTC

Technical Analysis

CVE-2026-21697 identifies a race condition vulnerability (CWE-362) in the axios4go Go HTTP client library versions before 0.6.4. The vulnerability stems from the global defaultClient object being mutated concurrently without proper synchronization during HTTP request execution. Specifically, the shared http.Client's Transport, Timeout, and CheckRedirect properties are modified during concurrent requests initiated by multiple goroutines (e.g., via GetAsync or PostAsync methods). This unsynchronized mutation can cause data races leading to inconsistent or incorrect HTTP client behavior, such as leaking proxy configurations or authentication credentials between requests. Applications that use axios4go in concurrent environments with different proxy settings or sensitive data are particularly vulnerable. The flaw can compromise confidentiality by exposing tokens, API keys, or credentials across requests. The vulnerability is remotely exploitable without authentication or user interaction, as it occurs during normal concurrent HTTP client usage. The issue was addressed in axios4go version 0.6.4 by introducing proper synchronization mechanisms to protect shared client configuration during concurrent access. No known exploits are currently reported in the wild, but the high CVSS 8.2 score reflects the significant risk posed by this race condition in multi-threaded applications.

Potential Impact

For European organizations, the vulnerability poses a significant risk to confidentiality and integrity of sensitive data transmitted via HTTP clients in Go applications. Organizations using axios4go in microservices, APIs, or backend systems that handle authentication tokens, API keys, or proxy configurations concurrently may experience data leakage or request tampering. This can lead to unauthorized access, data breaches, or service disruption. The impact is heightened in sectors like finance, healthcare, and government where sensitive data protection is critical. Additionally, the vulnerability could undermine trust in internal or external APIs and complicate compliance with GDPR and other data protection regulations. Since exploitation requires no authentication or user interaction, attackers could remotely trigger concurrent requests to exploit the race condition. The lack of known exploits currently provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

1. Upgrade axios4go to version 0.6.4 or later immediately to ensure the race condition is fixed. 2. Audit all Go applications using axios4go to identify concurrent HTTP client usage patterns, especially where different proxy or authentication configurations are applied per request. 3. Refactor code to avoid sharing mutable global HTTP client configurations across goroutines without proper synchronization primitives such as mutexes or by using separate client instances per configuration. 4. Implement rigorous testing for concurrent request handling to detect race conditions using Go's race detector tool. 5. Monitor application logs for anomalies in HTTP client behavior or unexpected credential exposure. 6. Educate development teams on safe concurrent programming practices in Go, emphasizing immutable or properly synchronized shared state. 7. Review and tighten access controls and network segmentation to limit exposure of vulnerable services until patched. 8. Maintain an inventory of all internal and third-party Go libraries to quickly identify and remediate similar concurrency issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-02T18:45:27.397Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695ee0db07b8a419a74d164c

Added to database: 1/7/2026, 10:40:27 PM

Last enriched: 1/14/2026, 11:42:10 PM

Last updated: 2/7/2026, 5:17:16 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats