The vulnerability lies in the serveStatic middleware of the Hono framework. The root cause is an inconsistency in how paths with repeated slashes are handled by the routing layer versus the serveStatic middleware. An attacker can craft a URL with repeated slashes (e.g., //protected/resource) to bypass authorization middleware that is configured on a route without repeated slashes (e.g., /protected/*). The serveStatic function would then process this path, normalize it, and serve the file that should have been protected. The commit 9aff14bd727f8b0435c963363fd803260e7b8e3c directly addresses this by modifying the serveStatic function in src/middleware/serve-static/index.ts. The patch introduces a regular expression /[\\/\\\\]{2,}/ that explicitly disallows repeated slashes in the path, causing such requests to be rejected. Therefore, the serveStatic function is the vulnerable function as it is responsible for the improper path handling that leads to the authorization bypass.