{"id":"CVE-2026-29087","summary":"@hono/node-server: Authorization bypass for protected static paths via encoded slashes in Serve Static Middleware","details":"@hono/node-server allows running the Hono application on Node.js. Prior to version 1.19.10, when using @hono/node-server's static file serving together with route-based middleware protections (e.g. protecting /admin/*), inconsistent URL decoding can allow protected static resources to be accessed without authorization. In particular, paths containing encoded slashes (%2F) may be evaluated differently by routing/middleware matching versus static file path resolution, enabling a bypass where middleware does not run but the static file is still served. This issue has been patched in version 1.19.10.","aliases":["GHSA-wc8c-qw6v-h7f6"],"modified":"2026-05-18T05:59:45.635066563Z","published":"2026-03-06T17:03:30.412Z","related":["CGA-676w-93cv-mf32"],"database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/29xxx/CVE-2026-29087.json","cwe_ids":["CWE-863"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/29xxx/CVE-2026-29087.json"},{"type":"ADVISORY","url":"https://github.com/honojs/node-server/security/advisories/GHSA-wc8c-qw6v-h7f6"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-29087"},{"type":"FIX","url":"https://github.com/honojs/node-server/commit/455015be1697dd89974a68b70350ea7b2d126d2e"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/honojs/node-server","events":[{"introduced":"0"},{"fixed":"2f8ca3665f5257305603783ec9999bd1a9bec0f2"}]}],"versions":["v1.19.9","v1.19.8","v1.19.7","v1.19.6","v1.19.5","v1.19.4","v1.19.3","v1.19.2","v1.19.1","v1.19.0","v1.18.2","v1.18.1","v1.18.0","v1.17.1","v1.17.0","v1.16.0","v1.15.0","v1.14.4","v1.14.3","v1.14.2","v1.14.1","v1.14.0","v1.13.8","v1.13.7","v1.13.6","v1.13.5","v1.13.4","v1.13.3","v1.13.2","v1.13.1","v1.13.0","v1.12.2","v1.12.1","v1.12.0","v1.11.5","v1.11.4","v1.11.3","v1.11.2","v1.11.1","v1.11.0","v1.10.1","v1.10.0","v1.9.1","v1.9.0","v1.8.2","v1.8.1","v1.8.0","v1.7.0","v1.6.0","v1.5.0","v1.4.1","v1.4.0","v1.3.5","v1.3.4","v1.3.3","v1.3.2","v1.3.1","v1.3.0","v1.2.3","v1.2.2","v1.2.1","v1.2.0","v1.1.1","v1.1.0","v1.0.2","v1.0.1","v1.0.0","v0.6.0","v0.5.1","v0.5.0","v0.4.0","v0.3.0","v0.2.4","v0.2.3","v0.2.2","v0.2.1","v0.2.0","v0.1.3","v0.1.2","v0.1.1","v0.1.0","v0.0.2","v0.0.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-29087.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}