๐Ÿ” CVE Alert

CVE-2026-39407

MEDIUM 5.3

Hono has a middleware bypass via repeated slashes in serveStatic

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a path handling inconsistency in serveStatic allows protected static files to be accessed by using repeated slashes (//) in the request path. When route-based middleware (e.g., /admin/*) is used for authorization, the router may not match paths containing repeated slashes, while serveStatic resolves them as normalized paths. This can lead to a middleware bypass. This vulnerability is fixed in 4.12.12.

CWE CWE-22
Vendor honojs
Product hono
Published Apr 8, 2026
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for honojs hono

Be the first to know when new medium vulnerabilities affecting honojs hono are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

honojs / hono
< 4.12.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/honojs/hono/security/advisories/GHSA-wmmm-f939-6g9c github.com: https://github.com/honojs/hono/commit/9aff14bd727f8b0435c963363fd803260e7b8e3c github.com: https://github.com/honojs/hono/releases/tag/v4.12.12