CVE-2026-27700
Hono is a Web application framework that provides support for any JavaScript runtime. In versions 4.12.0 and 4.12.1, when using the AWS Lambda adapter (hono/aws-lambda) behind an Application Load Balancer (ALB), the getConnInfo() function incorrectly selected the first value from the X-Forwarded-For header. Because AWS ALB appends the real client IP address to the end of the X-Forwarded-For header, the first value can be attacker-controlled. This could allow IP-based access control mechanisms (such as the ipRestriction middleware) to be bypassed. Version 4.12.2 patches the issue.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/honojs/hono/releases/tag/v4.12.2, https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27700.json, https://github.com/honojs/hono/security/advisories/GHSA-xh87-mx6m-69f3, https://nvd.nist.gov/vuln/detail/CVE-2026-27700, https://github.com/honojs/hono/commit/41adbf56e252c04611f8972364ac0887ae07a4c7
