CRLF Injection Affecting hono package, versions >=0.2.1 <4.12.4


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about CRLF Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-HONO-15418360
  • published5 Mar 2026
  • disclosed5 Mar 2026
  • creditSaad FELLAHI

Introduced: 5 Mar 2026

NewCVE-2026-29086  (opens in a new tab)
CWE-93  (opens in a new tab)

How to fix?

Upgrade hono to version 4.12.4 or higher.

Overview

hono is an Ultrafast web framework for the Edges

Affected versions of this package are vulnerable to CRLF Injection via the setCookie() utility. An attacker can inject unauthorized cookie attributes by supplying specially crafted input containing semicolons, carriage returns, or newline characters in the domain or path fields.

Notes:

  • Successful exploitation requires the application to pass user-controlled input directly into the domain or path options of setCookie()
  • This issue is limited to attribute-level manipulation within a single Set-Cookie header.

References

CVSS Base Scores

version 4.0
version 3.1