Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a discrepancy between browser cookie parsing and parse() handling allows cookie prefix protections to be bypassed. Cookie names that are treated as distinct by the browser may be normalized to the same key by parse(), allowing attacker-controlled cookies to override legitimate ones. This vulnerability is fixed in 4.12.12.
References
| Link | Resource |
|---|---|
| https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0 | Third Party Advisory |
| https://github.com/honojs/hono/releases/tag/v4.12.12 | Release Notes |
| https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4 | Vendor Advisory |
Configurations
History
21 Apr 2026, 18:26
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Hono hono
Hono |
|
| CPE | cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:* | |
| CWE | NVD-CWE-noinfo | |
| References | () https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0 - Third Party Advisory | |
| References | () https://github.com/honojs/hono/releases/tag/v4.12.12 - Release Notes | |
| References | () https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4 - Vendor Advisory |
08 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 15:16
Updated : 2026-04-21 18:26
NVD link : CVE-2026-39410
Mitre link : CVE-2026-39410
CVE.ORG link : CVE-2026-39410
JSON object : View
Products Affected
hono
- hono
CWE
