Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21697: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in rezmoss axios4go

0
High
VulnerabilityCVE-2026-21697cvecve-2026-21697cwe-362
Published: Wed Jan 07 2026 (01/07/2026, 22:29:57 UTC)
Source: CVE Database V5
Vendor/Project: rezmoss
Product: axios4go

Description

axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue.

AI-Powered Analysis

AILast updated: 01/07/2026, 22:48:32 UTC

Technical Analysis

CVE-2026-21697 is a race condition vulnerability classified under CWE-362 affecting the axios4go Go HTTP client library prior to version 0.6.4. The root cause is the unsynchronized mutation of a global shared HTTP client instance named `defaultClient`. During concurrent HTTP requests executed via multiple goroutines (e.g., using GetAsync or PostAsync methods), the shared client's configuration properties—specifically `Transport`, `Timeout`, and `CheckRedirect`—are modified without proper synchronization mechanisms such as mutexes or atomic operations. This leads to a classic race condition where concurrent requests may interfere with each other's configurations, causing unpredictable behavior. For example, one request may inadvertently use another request's proxy settings or timeout values. This is particularly dangerous in scenarios where different requests require distinct proxy configurations or handle sensitive authentication credentials, tokens, or API keys. The vulnerability can result in confidentiality breaches (e.g., leaking tokens to unintended endpoints), integrity issues (e.g., requests being redirected or altered), and availability problems if requests fail due to misconfiguration. The vulnerability is remotely exploitable without authentication or user interaction, as it occurs during normal concurrent usage of the library. The CVSS 4.0 score of 8.2 reflects the high impact and ease of exploitation. The issue was publicly disclosed on January 7, 2026, and fixed in axios4go version 0.6.4. No known exploits have been reported in the wild to date, but the risk remains significant for affected deployments.

Potential Impact

For European organizations, the impact of CVE-2026-21697 can be substantial, especially for those developing or deploying Go-based applications that rely on axios4go for HTTP client functionality with concurrent request patterns. The vulnerability can lead to unauthorized disclosure of sensitive data such as authentication tokens, API keys, or session credentials if requests inadvertently share or leak configuration details. This can facilitate further attacks like account takeover, data exfiltration, or lateral movement within networks. Additionally, misrouted or altered requests due to race conditions can disrupt service availability or cause data integrity issues. Organizations in sectors handling sensitive personal data (e.g., finance, healthcare, government) are particularly at risk due to regulatory compliance requirements under GDPR and other data protection laws. The vulnerability's remote exploitability without authentication increases the threat surface, potentially affecting cloud-native applications, microservices, and APIs widely used across European enterprises. Failure to patch could also damage organizational reputation and lead to legal liabilities in case of data breaches.

Mitigation Recommendations

European organizations should immediately upgrade axios4go to version 0.6.4 or later, where the race condition has been fixed by introducing proper synchronization around the shared HTTP client configuration. For applications where upgrading is not immediately feasible, developers should implement temporary mitigations such as avoiding concurrent use of the global `defaultClient` instance by creating isolated HTTP client instances per request or goroutine. Additionally, review and refactor code to ensure that HTTP client configurations are immutable or properly synchronized when shared. Conduct thorough code audits to identify any other shared mutable state that could cause similar race conditions. Implement runtime monitoring and logging to detect anomalous request behaviors or configuration changes during concurrent execution. Finally, enforce strict access controls and secure handling of sensitive tokens and credentials to minimize impact if leakage occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-02T18:45:27.397Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695ee0db07b8a419a74d164c

Added to database: 1/7/2026, 10:40:27 PM

Last enriched: 1/7/2026, 10:48:32 PM

Last updated: 1/8/2026, 11:56:39 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats