Description
Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8.
References (3)
Core 3
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/honojs/hono/security/advisories/GHSA-rpfr-3m35-5vx5
Patch x_refsource_misc
https://github.com/honojs/hono/commit/41ce840379516410dee60c783142e05bb5a22449
Scores
CVSS v3
5.0
EPSS
0.0008
EPSS Percentile
23.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-352
Status
published
Products (2)
hono/hono
< 4.5.8
npm/hono
0 - 4.5.8npm
Published
Aug 22, 2024
Tracked Since
Feb 18, 2026