Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-22817

CVE-2026-22817: Hono JWT Auth Bypass Vulnerability

CVE-2026-22817 is an authentication bypass flaw in Hono's JWT verification middleware that enables algorithm confusion attacks, allowing forged tokens to be accepted. This article covers technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2026-22817 Overview

CVE-2026-22817 is a cryptographic vulnerability affecting the Hono Web application framework's JWT verification middleware. The flaw exists in Hono's JWK/JWKS JWT verification implementation, where the JWT header's alg value could influence signature verification when the selected JWK did not explicitly specify an algorithm. This vulnerability enables JWT algorithm confusion attacks and, under certain configurations, allows forged tokens to be accepted by the application.

Hono is a popular Web application framework that provides support for any JavaScript runtime, making this vulnerability particularly impactful for applications relying on JWT-based authentication across various deployment environments.

Critical Impact

Attackers can exploit JWT algorithm confusion to bypass authentication and forge valid tokens, potentially gaining unauthorized access to protected resources and user accounts.

Affected Products

  • Hono Web Application Framework versions prior to 4.11.4
  • Applications using Hono's JWT middleware with JWK/JWKS verification
  • Any JavaScript runtime environment running vulnerable Hono versions

Discovery Timeline

  • 2026-01-13 - CVE CVE-2026-22817 published to NVD
  • 2026-01-13 - Last updated in NVD database

Technical Details for CVE-2026-22817

Vulnerability Analysis

This vulnerability is classified under CWE-347 (Improper Verification of Cryptographic Signature). The root issue lies in how Hono's JWT middleware handled algorithm selection during signature verification. When a JWK in the JWKS did not explicitly specify an algorithm via the alg property, the middleware would fall back to using the algorithm specified in the JWT header itself.

This behavior creates a classic JWT algorithm confusion attack vector. An attacker could craft a malicious JWT with a manipulated alg header value to exploit this logic, potentially forcing the verification process to use a weaker or incompatible algorithm that the attacker can satisfy. In certain configurations, this could allow completely forged tokens to pass verification and be accepted as legitimate.

Root Cause

The root cause is the absence of explicit algorithm enforcement in the JWT middleware configuration. When the alg option was not required to be explicitly specified, the verification logic could derive the algorithm from the untrusted JWT header values, violating the security principle that cryptographic parameters should never be taken from untrusted input.

Attack Vector

The attack is network-based and requires no authentication or user interaction. An attacker with knowledge of the target's JWT verification configuration can craft a malicious JWT with a forged payload and manipulated algorithm header. By exploiting JWKs that lack explicit algorithm specification, the attacker can influence the verification process to use an algorithm they can satisfy, effectively bypassing signature validation.

The security patch demonstrates the fix by changing the alg parameter from optional to required:

typescript
  * @param {object} options - The options for the JWT middleware.
  * @param {SignatureKey} [options.secret] - A value of your secret key.
  * @param {string} [options.cookie] - If this value is set, then the value is retrieved from the cookie header using that value as a key, which is then validated as a token.
- * @param {SignatureAlgorithm} [options.alg=HS256] - An algorithm type that is used for verifying. Available types are `HS256` | `HS384` | `HS512` | `RS256` | `RS384` | `RS512` | `PS256` | `PS384` | `PS512` | `ES256` | `ES384` | `ES512` | `EdDSA`.
+ * @param {SignatureAlgorithm} options.alg - An algorithm type that is used for verifying (required). Available types are `HS256` | `HS384` | `HS512` | `RS256` | `RS384` | `RS512` | `PS256` | `PS384` | `PS512` | `ES256` | `ES384` | `ES512` | `EdDSA`.
  * @param {string} [options.headerName='Authorization'] - The name of the header to look for the JWT token. Default is 'Authorization'.
  * @param {VerifyOptions} [options.verification] - Additional options for JWT payload verification.
  * @returns {MiddlewareHandler} The middleware handler function.

Source: GitHub Commit Update

Additionally, new error types were introduced to handle algorithm-related issues:

typescript
 import { signing, verifying } from './jws'
 import type { HonoJsonWebKey, SignatureKey } from './jws'
 import {
+  JwtAlgorithmMismatch,
+  JwtAlgorithmRequired,
   JwtHeaderInvalid,
   JwtHeaderRequiresKid,
   JwtPayloadRequiresAud,

Source: GitHub Commit Update

Detection Methods for CVE-2026-22817

Indicators of Compromise

  • JWT tokens with unusual or unexpected alg header values in authentication logs
  • Multiple authentication attempts using different algorithm types from the same source
  • Successful authentication with tokens that have mismatched algorithm headers compared to expected configuration
  • Anomalous JWT payloads that pass verification despite suspicious signatures

Detection Strategies

  • Implement logging for all JWT verification attempts including the algorithm specified in the token header
  • Monitor for authentication events where the JWT header algorithm differs from the expected server-side configuration
  • Set up alerts for rapid succession of authentication attempts with varying algorithm parameters
  • Review application dependencies for Hono versions prior to 4.11.4

Monitoring Recommendations

  • Enable detailed logging in the JWT middleware to capture algorithm mismatch events
  • Monitor authentication success rates for anomalies that could indicate forged token acceptance
  • Implement runtime security monitoring to detect unauthorized access patterns following authentication
  • Set up dependency scanning to identify vulnerable Hono framework versions in your codebase

How to Mitigate CVE-2026-22817

Immediate Actions Required

  • Upgrade Hono to version 4.11.4 or later immediately
  • Audit all JWT middleware configurations to ensure the alg option is explicitly specified
  • Review authentication logs for any suspicious activity that may indicate prior exploitation
  • Regenerate JWT secrets if there is any suspicion of token forgery

Patch Information

The vulnerability is fixed in Hono version 4.11.4. The patch requires the alg option to be explicitly specified in JWT middleware configuration, preventing algorithm confusion by ensuring that the verification algorithm is not derived from untrusted JWT header values.

For detailed patch information, refer to:

  • GitHub Commit Update
  • GitHub Security Advisory GHSA-f67f-6cw9-8mq4

Workarounds

  • If immediate upgrade is not possible, ensure all JWKs in your JWKS explicitly specify the alg property
  • Implement additional validation layer to verify JWT header algorithms before processing
  • Consider implementing a Web Application Firewall (WAF) rule to reject JWTs with unexpected algorithm values
  • Restrict JWT algorithm acceptance to only the specific algorithm your application requires
bash
# Update Hono to patched version
npm update hono@4.11.4

# Or specify exact version in package.json
npm install hono@^4.11.4

# Verify installed version
npm list hono

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechHono

  • SeverityHIGH

  • CVSS Score8.2

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-347
  • Technical References
  • GitHub Commit Update

  • GitHub Security Advisory GHSA-f67f-6cw9-8mq4
  • Related CVEs
  • CVE-2026-39410: Hono Framework Auth Bypass Vulnerability

  • CVE-2026-39406: Hono Node.js Auth Bypass Vulnerability

  • CVE-2026-39409: Hono Auth Bypass Vulnerability

  • CVE-2026-29087: Hono Node Server Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English