Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xh87-mx6m-69f3 | Hono is Vulnerable to Authentication Bypass by IP Spoofing in AWS Lambda ALB conninfo |
Mon, 02 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:* |
Fri, 27 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hono
Hono hono |
|
| Vendors & Products |
Hono
Hono hono |
Wed, 25 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hono is a Web application framework that provides support for any JavaScript runtime. In versions 4.12.0 and 4.12.1, when using the AWS Lambda adapter (`hono/aws-lambda`) behind an Application Load Balancer (ALB), the `getConnInfo()` function incorrectly selected the first value from the `X-Forwarded-For` header. Because AWS ALB appends the real client IP address to the end of the `X-Forwarded-For` header, the first value can be attacker-controlled. This could allow IP-based access control mechanisms (such as the `ipRestriction` middleware) to be bypassed. Version 4.12.2 patches the issue. | |
| Title | Hono is Vulnerable to Authentication Bypass by IP Spoofing in AWS Lambda ALB conninfo | |
| Weaknesses | CWE-290 CWE-345 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-27T17:01:28.403Z
Reserved: 2026-02-23T17:56:51.202Z
Link: CVE-2026-27700
Updated: 2026-02-27T17:01:23.329Z
Status : Analyzed
Published: 2026-02-25T16:23:26.440
Modified: 2026-03-02T16:17:53.100
Link: CVE-2026-27700
No data.
OpenCVE Enrichment
Updated: 2026-04-16T16:15:08Z
Github GHSA