Vulnerability Description
axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rezmoss | Axios4Go | < 0.6.4 |
Related Weaknesses (CWE)
References
- https://github.com/rezmoss/axios4go/commit/b651604c64e66a115ab90cdab358b0181d74aPatch
- https://github.com/rezmoss/axios4go/releases/tag/v0.6.4Product
- https://github.com/rezmoss/axios4go/security/advisories/GHSA-cmj9-27wj-7x47MitigationVendor Advisory
FAQ
What is CVE-2026-21697?
CVE-2026-21697 is a vulnerability with a CVSS score of 8.1 (HIGH). axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execut...
How severe is CVE-2026-21697?
CVE-2026-21697 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-21697?
Check the references section above for vendor advisories and patch information. Affected products include: Rezmoss Axios4Go.