๐Ÿ” CVE Alert

CVE-2026-39408

HIGH 7.5

Hono has a path traversal in toSSG() allows writing files outside the output directory

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
4th

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a path traversal issue in toSSG() allows files to be written outside the configured output directory during static site generation. When using dynamic route parameters via ssgParams, specially crafted values can cause generated file paths to escape the intended output directory. This vulnerability is fixed in 4.12.12.

CWE CWE-22
Vendor honojs
Product hono
Published Apr 8, 2026
Last Updated Apr 10, 2026
Stay Ahead of the Next One

Get instant alerts for honojs hono

Be the first to know when new high vulnerabilities affecting honojs hono are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

honojs / hono
< 4.12.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/honojs/hono/security/advisories/GHSA-xf4j-xp2r-rqqx github.com: https://github.com/honojs/hono/commit/b470278920fffcfd6d76002755d6db53db827679 github.com: https://github.com/honojs/hono/releases/tag/v4.12.12