Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27700: CWE-345: Insufficient Verification of Data Authenticity in honojs hono

0
High
VulnerabilityCVE-2026-27700cvecve-2026-27700cwe-345cwe-290
Published: Wed Feb 25 2026 (02/25/2026, 15:01:44 UTC)
Source: CVE Database V5
Vendor/Project: honojs
Product: hono

Description

Hono is a Web application framework that provides support for any JavaScript runtime. In versions 4.12.0 and 4.12.1, when using the AWS Lambda adapter (`hono/aws-lambda`) behind an Application Load Balancer (ALB), the `getConnInfo()` function incorrectly selected the first value from the `X-Forwarded-For` header. Because AWS ALB appends the real client IP address to the end of the `X-Forwarded-For` header, the first value can be attacker-controlled. This could allow IP-based access control mechanisms (such as the `ipRestriction` middleware) to be bypassed. Version 4.12.2 patches the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:56:51 UTC

Technical Analysis

The vulnerability CVE-2026-27700 affects the honojs web application framework, specifically versions 4.12.0 and 4.12.1, when deployed with the AWS Lambda adapter (hono/aws-lambda) behind an AWS Application Load Balancer (ALB). The core issue lies in the getConnInfo() function, which is responsible for extracting client connection information, including the client IP address, from HTTP headers. In this scenario, the function incorrectly selects the first IP address from the X-Forwarded-For header. However, AWS ALB appends the true client IP address to the end of this header, meaning the first IP address is actually attacker-controlled and can be spoofed. This incorrect trust in the first IP allows an attacker to bypass IP-based access control mechanisms, such as the ipRestriction middleware, which rely on accurate client IP identification to enforce security policies. The vulnerability is classified under CWE-345 (Insufficient Verification of Data Authenticity) and CWE-290 (Authentication Bypass by Spoofing). Exploitation requires no authentication or user interaction and can be performed remotely by sending crafted requests with manipulated X-Forwarded-For headers. The vulnerability has a CVSS 3.1 score of 8.2 (high severity), reflecting its potential to compromise confidentiality by bypassing IP-based restrictions, though it has limited impact on integrity and no impact on availability. The issue was addressed in hono version 4.12.2 by correcting the logic to select the correct client IP from the X-Forwarded-For header, ensuring the real client IP appended by ALB is used for access control decisions.

Potential Impact

This vulnerability can have significant impact on organizations using the honojs framework with AWS Lambda behind an ALB, particularly if they rely on IP-based access controls to restrict access to sensitive resources or administrative interfaces. Attackers can spoof their IP address to appear as a trusted client, bypassing these controls and gaining unauthorized access. This can lead to exposure of confidential data, unauthorized actions, and potential lateral movement within the affected environment. Since the vulnerability requires no authentication and can be exploited remotely, it increases the attack surface considerably. Organizations using ipRestriction middleware or similar IP filtering mechanisms are at high risk. The impact is especially critical for environments where IP filtering is a primary security control, such as internal APIs, management consoles, or services exposed only to specific IP ranges. Although no known exploits are reported in the wild yet, the high CVSS score and ease of exploitation make timely remediation essential to prevent potential attacks.

Mitigation Recommendations

Organizations should immediately upgrade the honojs framework to version 4.12.2 or later, which contains the patch correcting the IP extraction logic. Until the upgrade can be applied, as a temporary mitigation, organizations can implement additional validation on the X-Forwarded-For header by inspecting the last IP address in the list rather than the first, or by configuring the ALB to use a different header for the real client IP if possible. Additionally, consider implementing defense-in-depth by combining IP-based restrictions with other authentication and authorization mechanisms, such as token-based authentication or mutual TLS, to reduce reliance on IP filtering alone. Monitoring and logging of suspicious IP addresses and unusual access patterns can help detect exploitation attempts. Network-level controls, such as AWS WAF rules, can also be configured to block suspicious requests with malformed or suspicious X-Forwarded-For headers. Finally, educate developers and security teams about the risks of trusting client-supplied headers without proper validation, especially in cloud load balancer environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-23T17:56:51.202Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f183fb7ef31ef0b2eb1c4

Added to database: 2/25/2026, 3:41:51 PM

Last enriched: 3/4/2026, 6:56:51 PM

Last updated: 4/12/2026, 9:54:18 AM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses