Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2485 articles · 106152 vulns · 38/41 feeds (7d)
← Back to list
6.5
CVE-2026-29085PATCHED
hono · hono

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using streamSSE() in Streaming Helper, the event, id, and retry fields were not vali

Description

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using streamSSE() in Streaming Helper, the event, id, and retry fields were not validated for carriage return (\r) or newline (\n) characters. Because the SSE protocol uses line breaks as field delimiters, this could allow injection of additional SSE fields within the same event frame if untrusted input was passed into these fields. This issue has been patched in version 4.12.4.

Affected Products

VendorProductVersions
honohono< 4.12.4

References

  • https://github.com/honojs/hono/commit/f4123ed9ea3c7c52380cc99a079a4d773838846e(Patch)
  • https://github.com/honojs/hono/security/advisories/GHSA-p6xx-57qc-3wxr(Vendor Advisory)

Related News (1 articles)

Tier B
BSI Advisories6h ago
[NEU] [hoch] IBM App Connect Enterprise (Hono und Undici): Mehrere Schwachstellen
→ No new info (linked only)
CVSS 3.16.5 MEDIUM
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch availablehttps://github.com/honojs/hono/commit/f4123ed9ea3c7c52380cc99a079a4d773838846e
CWECWE-74
PublishedMar 4, 2026
Last enriched4d ago
Trending Score23
Source articles1
Independent1
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-29045
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using serveStatic together with route-based middleware protections (e.g. app.use('/a
Trending: 27
MEDIUMCVE-2026-29086
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, the setCookie() utility did not validate semicolons (;), carriage returns (\r), or newlin
Trending: 23
HIGHCVE-2026-22818
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.11.4, there is a flaw in Hono’s JWK/JWKS JWT verification middleware allowed the algorithm specified in
HIGHCVE-2026-22817
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.11.4, there is a flaw in Hono’s JWK/JWKS JWT verification middleware allowed the JWT header’s alg value
MEDIUMCVE-2026-24398
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The `

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 4, 2026
Patch Available
Mar 6, 2026
Discovered by ZDM
Mar 26, 2026