Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2426 articles · 106129 vulns · 38/41 feeds (7d)
← Back to list
4.8
CVE-2026-24398PATCHED
hono · hono

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The `

Description

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The `IPV4_REGEX` pattern and `convertIPv4ToBinary` function in `src/utils/ipaddr.ts` do not properly validate that IPv4 octet values are within the valid range of 0-255, allowing attackers to craft malformed IP addresses that bypass IP-based access controls. Version 4.11.7 contains a patch for the issue.

Affected Products

VendorProductVersions
honohono< 4.11.7

References

  • https://github.com/honojs/hono/commit/edbf6eea8e6c26a3937518d4ed91d8666edeec37(Patch)
  • https://github.com/honojs/hono/releases/tag/v4.11.7(Release Notes)
  • https://github.com/honojs/hono/security/advisories/GHSA-r354-f388-2fhh(Vendor Advisory)
CVSS 3.14.8 MEDIUM
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch availablehttps://github.com/honojs/hono/commit/edbf6eea8e6c26a3937518d4ed91d8666edeec37
CWECWE-185
PublishedJan 27, 2026
Last enriched4d ago
Trending Score0
Source articles0
Independent0
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-29045
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using serveStatic together with route-based middleware protections (e.g. app.use('/a
Trending: 27
MEDIUMCVE-2026-29085
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using streamSSE() in Streaming Helper, the event, id, and retry fields were not vali
Trending: 23
MEDIUMCVE-2026-29086
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, the setCookie() utility did not validate semicolons (;), carriage returns (\r), or newlin
Trending: 23
HIGHCVE-2026-22818
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.11.4, there is a flaw in Hono’s JWK/JWKS JWT verification middleware allowed the algorithm specified in
HIGHCVE-2026-22817
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.11.4, there is a flaw in Hono’s JWK/JWKS JWT verification middleware allowed the JWT header’s alg value

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Jan 27, 2026
Patch Available
Feb 4, 2026
Discovered by ZDM
Mar 26, 2026