CVE-2026-27959
EUVD-2026-881626.02.2026, 02:16
Koa is middleware for Node.js using ES2017 async functions. Prior to versions 3.1.2 and 2.16.4, Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol is received, `ctx.hostname` returns `evil[.]com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. Versions 3.1.2 and 2.16.4 fix the issue.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| koajs | koa | 𝑥 < 2.16.14 |
| koajs | koa | 3.0.0 ≤ 𝑥 < 3.1.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration