Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rezmoss
Rezmoss axios4go |
|
| CPEs | cpe:2.3:a:rezmoss:axios4go:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Rezmoss
Rezmoss axios4go |
|
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | axios4go is a Go HTTP client library. Prior to version 0.6.4, a race condition vulnerability exists in the shared HTTP client configuration. The global `defaultClient` is mutated during request execution without synchronization, directly modifying the shared `http.Client`'s `Transport`, `Timeout`, and `CheckRedirect` properties. Impacted applications include that that use axios4go with concurrent requests (multiple goroutines, `GetAsync`, `PostAsync`, etc.), those where different requests use different proxy configurations, and those that handle sensitive data (authentication credentials, tokens, API keys). Version 0.6.4 fixes this issue. | |
| Title | axios4go's Race Condition in Shared HTTP Client Allows Proxy Configuration Leak | |
| Weaknesses | CWE-362 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-08T20:37:17.978Z
Reserved: 2026-01-02T18:45:27.397Z
Link: CVE-2026-21697
Updated: 2026-01-08T20:37:12.742Z
Status : Analyzed
Published: 2026-01-07T23:15:50.533
Modified: 2026-03-09T13:57:52.080
Link: CVE-2026-21697
No data.
OpenCVE Enrichment
Updated: 2026-04-18T17:00:05Z