CVE-2026-27959

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
26/02/2026
Last modified:
28/02/2026

Description

Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol is received, `ctx.hostname` returns `evil[.]com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:koajs:koa:*:*:*:*:*:node.js:*:* 2.16.14 (excluding)
cpe:2.3:a:koajs:koa:*:*:*:*:*:node.js:*:* 3.0.0 (including) 3.1.2 (excluding)