CVE-2026-27700: CWE-345: Insufficient Verification of Data Authenticity in honojs hono
Hono is a Web application framework that provides support for any JavaScript runtime. In versions 4.12.0 and 4.12.1, when using the AWS Lambda adapter (`hono/aws-lambda`) behind an Application Load Balancer (ALB), the `getConnInfo()` function incorrectly selected the first value from the `X-Forwarded-For` header. Because AWS ALB appends the real client IP address to the end of the `X-Forwarded-For` header, the first value can be attacker-controlled. This could allow IP-based access control mechanisms (such as the `ipRestriction` middleware) to be bypassed. Version 4.12.2 patches the issue.
AI Analysis
Technical Summary
The vulnerability CVE-2026-27700 affects the hono JavaScript web framework, specifically versions 4.12.0 and 4.12.1 when deployed with the AWS Lambda adapter (hono/aws-lambda) behind an AWS Application Load Balancer (ALB). The core issue lies in the getConnInfo() function, which is responsible for extracting client connection information, including the client IP address, from HTTP headers. AWS ALB appends the actual client IP address at the end of the X-Forwarded-For header, but hono incorrectly selects the first IP address in this header for access control decisions. Since the first IP in the X-Forwarded-For header can be set by an attacker, this allows them to spoof their IP address. Consequently, IP-based access control mechanisms, such as the ipRestriction middleware that relies on the client IP for authorization, can be bypassed. This results in unauthorized access to protected resources or functionality. The vulnerability is classified under CWE-345 (Insufficient Verification of Data Authenticity) and CWE-290 (Authentication Bypass). The CVSS v3.1 base score is 8.2, reflecting a high severity due to network exploitability, no required privileges or user interaction, and a significant confidentiality impact. The issue was publicly disclosed on February 25, 2026, and patched in hono version 4.12.2. No known exploits in the wild have been reported as of now.
Potential Impact
This vulnerability can have serious consequences for organizations using hono versions 4.12.0 or 4.12.1 behind AWS ALB with the AWS Lambda adapter. Attackers can spoof their IP address to bypass IP-based access controls, potentially gaining unauthorized access to sensitive application endpoints or administrative functions protected by IP restrictions. This undermines the confidentiality of data and may lead to further exploitation or lateral movement within the environment. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely and at scale. Organizations relying on IP-based restrictions as a primary security control are particularly at risk. The availability and integrity impacts are limited, but the breach of confidentiality and trust in client IP information can facilitate additional attacks or data leakage. The widespread use of AWS ALB and the growing adoption of serverless architectures with hono increase the scope of affected systems globally.
Mitigation Recommendations
Organizations should immediately upgrade hono to version 4.12.2 or later, where the getConnInfo() function correctly parses the X-Forwarded-For header by selecting the last IP address appended by the AWS ALB. Until upgrading, consider implementing additional validation on the client IP address, such as verifying the source IP against trusted proxy IP ranges or using AWS ALB's X-Amzn-Trace-Id or other headers that cannot be spoofed by clients. Avoid relying solely on the first IP in the X-Forwarded-For header for access control decisions. Review and strengthen IP-based access control policies, and consider multi-factor or token-based authentication mechanisms to reduce reliance on IP filtering. Monitor application logs for suspicious IP addresses or access patterns that may indicate exploitation attempts. Employ Web Application Firewalls (WAF) with rules to detect and block malformed or suspicious X-Forwarded-For headers. Finally, conduct security testing to verify that IP spoofing is no longer possible after patching.
Affected Countries
United States, Germany, United Kingdom, Japan, Canada, Australia, France, Netherlands, India, South Korea
CVE-2026-27700: CWE-345: Insufficient Verification of Data Authenticity in honojs hono
Description
Hono is a Web application framework that provides support for any JavaScript runtime. In versions 4.12.0 and 4.12.1, when using the AWS Lambda adapter (`hono/aws-lambda`) behind an Application Load Balancer (ALB), the `getConnInfo()` function incorrectly selected the first value from the `X-Forwarded-For` header. Because AWS ALB appends the real client IP address to the end of the `X-Forwarded-For` header, the first value can be attacker-controlled. This could allow IP-based access control mechanisms (such as the `ipRestriction` middleware) to be bypassed. Version 4.12.2 patches the issue.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-27700 affects the hono JavaScript web framework, specifically versions 4.12.0 and 4.12.1 when deployed with the AWS Lambda adapter (hono/aws-lambda) behind an AWS Application Load Balancer (ALB). The core issue lies in the getConnInfo() function, which is responsible for extracting client connection information, including the client IP address, from HTTP headers. AWS ALB appends the actual client IP address at the end of the X-Forwarded-For header, but hono incorrectly selects the first IP address in this header for access control decisions. Since the first IP in the X-Forwarded-For header can be set by an attacker, this allows them to spoof their IP address. Consequently, IP-based access control mechanisms, such as the ipRestriction middleware that relies on the client IP for authorization, can be bypassed. This results in unauthorized access to protected resources or functionality. The vulnerability is classified under CWE-345 (Insufficient Verification of Data Authenticity) and CWE-290 (Authentication Bypass). The CVSS v3.1 base score is 8.2, reflecting a high severity due to network exploitability, no required privileges or user interaction, and a significant confidentiality impact. The issue was publicly disclosed on February 25, 2026, and patched in hono version 4.12.2. No known exploits in the wild have been reported as of now.
Potential Impact
This vulnerability can have serious consequences for organizations using hono versions 4.12.0 or 4.12.1 behind AWS ALB with the AWS Lambda adapter. Attackers can spoof their IP address to bypass IP-based access controls, potentially gaining unauthorized access to sensitive application endpoints or administrative functions protected by IP restrictions. This undermines the confidentiality of data and may lead to further exploitation or lateral movement within the environment. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely and at scale. Organizations relying on IP-based restrictions as a primary security control are particularly at risk. The availability and integrity impacts are limited, but the breach of confidentiality and trust in client IP information can facilitate additional attacks or data leakage. The widespread use of AWS ALB and the growing adoption of serverless architectures with hono increase the scope of affected systems globally.
Mitigation Recommendations
Organizations should immediately upgrade hono to version 4.12.2 or later, where the getConnInfo() function correctly parses the X-Forwarded-For header by selecting the last IP address appended by the AWS ALB. Until upgrading, consider implementing additional validation on the client IP address, such as verifying the source IP against trusted proxy IP ranges or using AWS ALB's X-Amzn-Trace-Id or other headers that cannot be spoofed by clients. Avoid relying solely on the first IP in the X-Forwarded-For header for access control decisions. Review and strengthen IP-based access control policies, and consider multi-factor or token-based authentication mechanisms to reduce reliance on IP filtering. Monitor application logs for suspicious IP addresses or access patterns that may indicate exploitation attempts. Employ Web Application Firewalls (WAF) with rules to detect and block malformed or suspicious X-Forwarded-For headers. Finally, conduct security testing to verify that IP spoofing is no longer possible after patching.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T17:56:51.202Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f183fb7ef31ef0b2eb1c4
Added to database: 2/25/2026, 3:41:51 PM
Last enriched: 2/25/2026, 3:56:08 PM
Last updated: 2/26/2026, 7:09:29 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.