{"id":"CVE-2026-39406","summary":"@hono/node-server has a middleware bypass via repeated slashes in serveStatic","details":"@hono/node-server allows running the Hono application on Node.js. Prior to 1.19.13, a path handling inconsistency in serveStatic allows protected static files to be accessed by using repeated slashes (//) in the request path. When route-based middleware (e.g., /admin/*) is used for authorization, the router may not match paths containing repeated slashes, while serveStatic resolves them as normalized paths. This can lead to a middleware bypass. This vulnerability is fixed in 1.19.13.","aliases":["GHSA-92pp-h63x-v22m"],"modified":"2026-04-09T04:09:21.478424Z","published":"2026-04-08T14:34:30.543Z","related":["CGA-33f9-cxc3-pfp4"],"database_specific":{"cwe_ids":["CWE-22"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/39xxx/CVE-2026-39406.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/39xxx/CVE-2026-39406.json"},{"type":"ADVISORY","url":"https://github.com/honojs/node-server/security/advisories/GHSA-92pp-h63x-v22m"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-39406"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/honojs/node-server","events":[{"introduced":"0"},{"fixed":"fd64e659a34ec661fd9ccda00d1b9dff88dfaf90"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.19.13"}]}}],"versions":["v0.0.1","v0.0.2","v0.1.0","v0.1.1","v0.1.2","v0.1.3","v0.2.0","v0.2.1","v0.2.2","v0.2.3","v0.2.4","v0.3.0","v0.4.0","v0.5.0","v0.5.1","v0.6.0","v1.0.0","v1.0.1","v1.0.2","v1.1.0","v1.1.1","v1.10.0","v1.10.1","v1.11.0","v1.11.1","v1.11.2","v1.11.3","v1.11.4","v1.11.5","v1.12.0","v1.12.1","v1.12.2","v1.13.0","v1.13.1","v1.13.2","v1.13.3","v1.13.4","v1.13.5","v1.13.6","v1.13.7","v1.13.8","v1.14.0","v1.14.1","v1.14.2","v1.14.3","v1.14.4","v1.15.0","v1.16.0","v1.17.0","v1.17.1","v1.18.0","v1.18.1","v1.18.2","v1.19.0","v1.19.1","v1.19.10","v1.19.11","v1.19.12","v1.19.2","v1.19.3","v1.19.4","v1.19.5","v1.19.6","v1.19.7","v1.19.8","v1.19.9","v1.2.0","v1.2.1","v1.2.2","v1.2.3","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.4.0","v1.4.1","v1.5.0","v1.6.0","v1.7.0","v1.8.0","v1.8.1","v1.8.2","v1.9.0","v1.9.1","v2.0.0-rc.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-39406.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}