Логотип exploitDog
bind:CVE-2026-27959
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-27959

Количество 4

Количество 4

redhat логотип

CVE-2026-27959

30 дней назад

Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol is received, `ctx.hostname` returns `evil[.]com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.

CVSS3: 8.2
EPSS: Низкий
nvd логотип

CVE-2026-27959

30 дней назад

Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol is received, `ctx.hostname` returns `evil[.]com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2026-27959

30 дней назад

Koa is middleware for Node.js using ES2017 async functions. Prior to v ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-7gcc-r8m5-44qm

29 дней назад

Koa has Host Header Injection via ctx.hostname

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-27959

Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol is received, `ctx.hostname` returns `evil[.]com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.

CVSS3: 8.2
0%
Низкий
30 дней назад
nvd логотип
CVE-2026-27959

Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol is received, `ctx.hostname` returns `evil[.]com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.

CVSS3: 7.5
0%
Низкий
30 дней назад
debian логотип
CVE-2026-27959

Koa is middleware for Node.js using ES2017 async functions. Prior to v ...

CVSS3: 7.5
0%
Низкий
30 дней назад
github логотип
GHSA-7gcc-r8m5-44qm

Koa has Host Header Injection via ctx.hostname

CVSS3: 7.5
0%
Низкий
29 дней назад

Уязвимостей на страницу