Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol is received, `ctx.hostname` returns `evil[.]com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-26 02:16
Updated : 2026-02-28 00:55
NVD link : CVE-2026-27959
Mitre link : CVE-2026-27959
CVE.ORG link : CVE-2026-27959
JSON object : View
Products Affected
koajs
- koa
CWE
