LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-27700

CVE-2026-27700 - Vulnerability Analysis

HighCVSS: 8.2

Last Updated: February 27, 2026

Hono - Authentication Bypass

Published: February 25, 2026Updated: February 27, 2026Remote Exploitable

Overview

Hono 4.12.0 and 4.12.1 contain an IP restriction bypass caused by incorrect selection of the first value in the X-Forwarded-For header in hono/aws-lambda behind AWS ALB, letting attackers bypass IP-based access control, exploit requires use behind AWS ALB.

Severity & Score

Severity: High
CVSS Score: 8.2
EPSS Score: 1.5%(Probability of exploitation in next 30 days)

Impact

Attackers can bypass IP-based access controls, potentially gaining unauthorized access to restricted resources.

Mitigation

Upgrade to version 4.12.2 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 25, 2026

🟠 CVE-2026-27700 - High (8.2) Hono is a Web application framework that provides support for any JavaScript runtime. In versions 4.12.0 and 4.12.1, when using the AWS Lambda adapter (`hono/aws-lambda`) behind an Application Load Balancer (ALB), the `getConnInfo()` function inco... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-27700/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-27700
Severity
High
CVSS Score
8.2
Type
broken_access_control
Status
unconfirmed
EPSS
1.5%
Social Posts
1

CWE

  • CWE-290

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

EPSS Score

1.5%Probability of exploitation in the next 30 days