We found results for “”
CVE-2026-24398
Good to know:
Date: January 27, 2026
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The "IPV4_REGEX" pattern and "convertIPv4ToBinary" function in "src/utils/ipaddr.ts" do not properly validate that IPv4 octet values are within the valid range of 0-255, allowing attackers to craft malformed IP addresses that bypass IP-based access controls. Version 4.11.7 contains a patch for the issue.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Incorrect Regular Expression
CWE-185Top Fix
Upgrade Version
Upgrade to version hono - 4.11.7;https://github.com/honojs/hono.git - v4.11.7
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


