Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-27959

Опубликовано: 26 фев. 2026
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's ctx.hostname API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a @ symbol is received, ctx.hostname returns evil[.]com - an attacker-controlled value. Applications using ctx.hostname for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:koajs:koa:*:*:*:*:*:node.js:*:*
Версия до 2.16.14 (исключая)
cpe:2.3:a:koajs:koa:*:*:*:*:*:node.js:*:*
Версия от 3.0.0 (включая) до 3.1.2 (исключая)

EPSS

Процентиль: 31%
0.00117
Низкий

7.5 High

CVSS3

Дефекты

CWE-20
NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 8.2
redhat
30 дней назад

Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol is received, `ctx.hostname` returns `evil[.]com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.

CVSS3: 7.5
debian
30 дней назад

Koa is middleware for Node.js using ES2017 async functions. Prior to v ...

CVSS3: 7.5
github
29 дней назад

Koa has Host Header Injection via ctx.hostname

EPSS

Процентиль: 31%
0.00117
Низкий

7.5 High

CVSS3

Дефекты

CWE-20
NVD-CWE-noinfo