CVE-2026-27700

Source
https://cve.org/CVERecord?id=CVE-2026-27700
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27700.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27700
Aliases
Related
Published
2026-02-25T15:01:44.681Z
Modified
2026-03-03T02:56:38.429523Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N CVSS Calculator
Summary
Hono is Vulnerable to Authentication Bypass by IP Spoofing in AWS Lambda ALB conninfo
Details

Hono is a Web application framework that provides support for any JavaScript runtime. In versions 4.12.0 and 4.12.1, when using the AWS Lambda adapter (hono/aws-lambda) behind an Application Load Balancer (ALB), the getConnInfo() function incorrectly selected the first value from the X-Forwarded-For header. Because AWS ALB appends the real client IP address to the end of the X-Forwarded-For header, the first value can be attacker-controlled. This could allow IP-based access control mechanisms (such as the ipRestriction middleware) to be bypassed. Version 4.12.2 patches the issue.

Database specific
{
    "cwe_ids": [
        "CWE-290",
        "CWE-345"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27700.json"
}
References

Affected packages

Git / github.com/honojs/hono

Affected ranges

Type
GIT
Repo
https://github.com/honojs/hono
Events

Affected versions

v4.*
v4.12.0
v4.12.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27700.json"