The vulnerability exists in the @hono/node-server package and is an authorization bypass in the serveStatic middleware. The root cause is an inconsistency in URL path handling between Hono's router and the serveStatic function. The router does not decode URL-encoded characters like %2F (slash) before matching routes, while the serveStatic function, prior to the patch, used decodeURIComponent, which does. This allowed an attacker to craft a URL that would bypass route-based authorization checks but still be correctly interpreted by the file-serving logic. The provided commit patch confirms this analysis. It replaces the vulnerable decodeURIComponent(c.req.path) with a new tryDecodeURI(c.req.path) function. The new implementation uses decodeURI, which, unlike decodeURIComponent, does not decode reserved characters such as /. This change ensures that a path with an encoded slash is treated consistently by both the router and the static file server, preventing the bypass. The vulnerable function is therefore serveStatic as it contained the logic that improperly processed the user-controlled request path.