CVE-2026-27700
Plain English Summary
AI-powered analysis for quick understanding
An attacker can bypass IP-based access controls in Hono applications by manipulating the `X-Forwarded-For` header, allowing them to gain unauthorized access to restricted areas. This vulnerability occurs specifically when using the AWS Lambda adapter behind an Application Load Balancer in versions 4.12.0 and 4.12.1, and it has been fixed in version 4.12.2.
Technical Description
Hono is a Web application framework that provides support for any JavaScript runtime. In versions 4.12.0 and 4.12.1, when using the AWS Lambda adapter (`hono/aws-lambda`) behind an Application Load Balancer (ALB), the `getConnInfo()` function incorrectly selected the first value from the `X-Forwarded-For` header. Because AWS ALB appends the real client IP address to the end of the `X-Forwarded-For` header, the first value can be attacker-controlled. This could allow IP-based access control mechanisms (such as the `ipRestriction` middleware) to be bypassed. Version 4.12.2 patches the issue.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 25, 2026
about 1 month ago
Last Modified
Mar 2, 2026
about 1 month ago
Vendor
hono
Product
hono