User Impersonation Affecting hono package, versions >=4.12.0 <4.12.2


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-HONO-15353409
  • published26 Feb 2026
  • disclosed25 Feb 2026
  • creditEdamAme-x

Introduced: 25 Feb 2026

NewCVE-2026-27700  (opens in a new tab)
CWE-290  (opens in a new tab)

How to fix?

Upgrade hono to version 4.12.2 or higher.

Overview

hono is an Ultrafast web framework for the Edges

Affected versions of this package are vulnerable to User Impersonation via the getConnInfo function in the adapter/aws-lambda/conninfo.ts‎ file. An attacker can gain unauthorized access to resources protected by IP-based access controls by supplying a crafted X-Forwarded-For header.

Note:

This is only exploitable if the deployment uses the AWS Lambda adapter behind an Application Load Balancer (ALB) and relies on getConnInfo() for IP-based authorization decisions.

CVSS Base Scores

version 4.0
version 3.1