CVE-2026-27959

Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol is received, `ctx.hostname` returns `evil[.]com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:koajs:koa:*:*:*:*:*:node.js:*:*
cpe:2.3:a:koajs:koa:*:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2026-02-26 02:16

Updated : 2026-02-28 00:55


NVD link : CVE-2026-27959

Mitre link : CVE-2026-27959

CVE.ORG link : CVE-2026-27959


JSON object : View

Products Affected

koajs

  • koa
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo