Description
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The `IPV4_REGEX` pattern and `convertIPv4ToBinary` function in `src/utils/ipaddr.ts` do not properly validate that IPv4 octet values are within the valid range of 0-255, allowing attackers to craft malformed IP addresses that bypass IP-based access controls. Version 4.11.7 contains a patch for the issue.
Published: 2026-01-27
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: IP Spoofing via bypass of IP restriction
Action: Immediate Patch
AI Analysis

Impact

The vulnerability stems from an insufficient check of IPv4 octet ranges within the IP Restriction Middleware. The regex and conversion function accept addresses with octet values outside 0–255, enabling attackers to craft malformed IPs that evade IP‑based access controls. A successful bypass permits attackers to impersonate trusted IP addresses, thereby potentially gaining unauthorized access to protected resources.

Affected Systems

The flaw affects the Hono web application framework, particularly versions prior to 4.11.7. All deployments running older releases on any JavaScript runtime, including Node.js, are susceptible. Newly released version 4.11.7 includes the required patch.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate severity, and the EPSS score below 1% suggests a low probability of exploitation in the wild. The vulnerability is not currently listed in the CISA KEV catalog. Based on the description, the attack vector is inferred to be remote, as malicious actors could send crafted requests from an arbitrary source to bypass IP restrictions. Exploitation requires an attacker’s ability to influence the IP address used in the request header or similar means.

Generated by OpenCVE AI on April 18, 2026 at 01:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Hono to version 4.11.7 or later for the official fix
  • If an immediate upgrade is not feasible, enforce strict source IP filtering at the network or proxy layer to block spoofed IP ranges
  • Verify that custom authentication or middleware layers correctly validate all incoming IP addresses before granting access

Generated by OpenCVE AI on April 18, 2026 at 01:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r354-f388-2fhh Hono IPv4 address validation bypass in IP Restriction Middleware allows IP spoofing
History

Wed, 04 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*

Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Hono
Hono hono
Vendors & Products Hono
Hono hono

Tue, 27 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The `IPV4_REGEX` pattern and `convertIPv4ToBinary` function in `src/utils/ipaddr.ts` do not properly validate that IPv4 octet values are within the valid range of 0-255, allowing attackers to craft malformed IP addresses that bypass IP-based access controls. Version 4.11.7 contains a patch for the issue.
Title Hono's IPv4 address validation bypass in IP Restriction Middleware allows IP spoofing
Weaknesses CWE-185
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T19:20:35.594Z

Reserved: 2026-01-22T18:19:49.172Z

Link: CVE-2026-24398

cve-icon Vulnrichment

Updated: 2026-01-27T19:19:57.633Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-27T19:16:16.363

Modified: 2026-02-04T15:34:58.003

Link: CVE-2026-24398

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:00:10Z

Weaknesses