Логотип exploitDog
bind:CVE-2026-24398
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-24398

Количество 2

Количество 2

nvd логотип

CVE-2026-24398

12 дней назад

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The `IPV4_REGEX` pattern and `convertIPv4ToBinary` function in `src/utils/ipaddr.ts` do not properly validate that IPv4 octet values are within the valid range of 0-255, allowing attackers to craft malformed IP addresses that bypass IP-based access controls. Version 4.11.7 contains a patch for the issue.

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-r354-f388-2fhh

12 дней назад

Hono IPv4 address validation bypass in IP Restriction Middleware allows IP spoofing

CVSS3: 4.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-24398

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The `IPV4_REGEX` pattern and `convertIPv4ToBinary` function in `src/utils/ipaddr.ts` do not properly validate that IPv4 octet values are within the valid range of 0-255, allowing attackers to craft malformed IP addresses that bypass IP-based access controls. Version 4.11.7 contains a patch for the issue.

CVSS3: 4.8
0%
Низкий
12 дней назад
github логотип
GHSA-r354-f388-2fhh

Hono IPv4 address validation bypass in IP Restriction Middleware allows IP spoofing

CVSS3: 4.8
0%
Низкий
12 дней назад

Уязвимостей на страницу