Description
@hono/node-server allows running the Hono application on Node.js. Prior to 1.19.13, a path handling inconsistency in serveStatic allows protected static files to be accessed by using repeated slashes (//) in the request path. When route-based middleware (e.g., /admin/*) is used for authorization, the router may not match paths containing repeated slashes, while serveStatic resolves them as normalized paths. This can lead to a middleware bypass. This vulnerability is fixed in 1.19.13.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Middleware bypass exposing protected files
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises from an inconsistency in path handling within the serveStatic middleware of the @hono/node-server library. Prior to version 1.19.13, URLs that contain multiple consecutive slashes are normalized by serveStatic before reaching the routing layer, but the router’s middleware matching does not account for these repeated slashes. As a result, requests for protected static assets that use double slashes can bypass route‑based authorization middleware, potentially exposing sensitive files or resources. This is a path‑handling flaw that can lead to an unauthorized disclosure of confidential data.

Affected Systems

Users running the honojs:node-server package, specifically versions of the @hono/node-server library earlier than 1.19.13, are affected. The bug exists in the serveStatic component that serves static files for Hono applications on Node.js.

Risk and Exploitability

With a CVSS score of 5.3, the flaw is considered a medium‑severity issue. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it by crafting HTTP requests that include repeated slashes in the path to static resources, thereby bypassing route‑based middleware guards that protect sensitive files. The exploitation requires only network access to the application and does not rely on any additional privileges or local execution.

Generated by OpenCVE AI on April 8, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that your @hono/node-server package is at or above version 1.19.13.
  • If not, upgrade the package to 1.19.13 or a later release.
  • After upgrading, test that serveStatic normalizes paths correctly and that protected routes enforce middleware.
  • Optionally, monitor logs for unexpected repeated slash requests.

Generated by OpenCVE AI on April 8, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-92pp-h63x-v22m @hono/node-server: Middleware bypass via repeated slashes in serveStatic
History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hono:node-server:*:*:*:*:*:node.js:*:*

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Hono
Hono node-server
Vendors & Products Hono
Hono node-server

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description @hono/node-server allows running the Hono application on Node.js. Prior to 1.19.13, a path handling inconsistency in serveStatic allows protected static files to be accessed by using repeated slashes (//) in the request path. When route-based middleware (e.g., /admin/*) is used for authorization, the router may not match paths containing repeated slashes, while serveStatic resolves them as normalized paths. This can lead to a middleware bypass. This vulnerability is fixed in 1.19.13.
Title @hono/node-server has a middleware bypass via repeated slashes in serveStatic
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Hono Node-server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T15:17:38.121Z

Reserved: 2026-04-07T00:23:30.594Z

Link: CVE-2026-39406

cve-icon Vulnrichment

Updated: 2026-04-08T15:17:34.377Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T15:16:14.513

Modified: 2026-04-21T18:38:40.410

Link: CVE-2026-39406

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:18:50Z

Weaknesses