chore(deps): update dependency hono to v4.9.6 [security] #34
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.8.4
->4.9.6
GitHub Vulnerability Alerts
CVE-2025-58362
Summary
A flaw in the
getPath
utility function could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx location blocks).Details
The original implementation relied on fixed character offsets when parsing request URLs. Under certain malformed absolute-form Request-URIs, this could lead to incorrect path extraction.
Most standards-compliant runtimes and reverse proxies reject such malformed requests with a 400 Bad Request, so the impact depends on the application and environment.
Impact
If proxy ACLs are used to protect sensitive endpoints such as
/admin
, this flaw could have allowed unauthorized access. The confidentiality impact depends on what data is exposed: if sensitive administrative data is exposed, the impact may be High (CVSS 7.5); otherwise it may be Medium (CVSS 5.3).Resolution
The implementation has been updated to correctly locate the first slash after "://", preventing such path confusion.
Hono's flaw in URL path parsing could cause path confusion
CVE-2025-58362 / GHSA-9hp6-4448-45g2
More information
Details
Summary
A flaw in the
getPath
utility function could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx location blocks).Details
The original implementation relied on fixed character offsets when parsing request URLs. Under certain malformed absolute-form Request-URIs, this could lead to incorrect path extraction.
Most standards-compliant runtimes and reverse proxies reject such malformed requests with a 400 Bad Request, so the impact depends on the application and environment.
Impact
If proxy ACLs are used to protect sensitive endpoints such as
/admin
, this flaw could have allowed unauthorized access. The confidentiality impact depends on what data is exposed: if sensitive administrative data is exposed, the impact may be High (CVSS 7.5); otherwise it may be Medium (CVSS 5.3).Resolution
The implementation has been updated to correctly locate the first slash after "://", preventing such path confusion.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
honojs/hono (hono)
v4.9.6
Compare Source
Security
Fixed a bug in URL path parsing (
getPath
) that could cause path confusion under malformed requests.If you rely on reverse proxies (e.g. Nginx) for ACLs or restrict access to endpoints like
/admin
, please update immediately.See advisory for details: GHSA-9hp6-4448-45g2
What's Changed
Full Changelog: honojs/hono@v4.9.5...v4.9.6
v4.9.5
Compare Source
What's Changed
origin
andallowMethods
by @jobrk in #4373app.fetch
inhandle
by @yusukebe in #4374New Contributors
Full Changelog: honojs/hono@v4.9.4...v4.9.5
v4.9.4
Compare Source
What's Changed
deno publish
by @yusukebe in #4364Full Changelog: honojs/hono@v4.9.3...v4.9.4
v4.9.3
Compare Source
What's Changed
customFetch
option to allow custom fetch function by @yusukebe in #4360typescript
to5.9.2
by @yusukebe in #4362packageManager
field topackage.json
by @yusukebe in #4363Full Changelog: honojs/hono@v4.9.2...v4.9.3
v4.9.2
Compare Source
What's Changed
removeIndexString
by @yusukebe in #4352New Contributors
Full Changelog: honojs/hono@v4.9.1...v4.9.2
v4.9.1
Compare Source
What's Changed
DetailedError.name
(+ error tests) by @NamesMT in #4344Full Changelog: honojs/hono@v4.9.0...v4.9.1
v4.9.0
Compare Source
Release Notes
Hono v4.9.0 is now available!
This release introduces several enhancements and utilities.
The main highlight is the new
parseResponse
utility that makes it easier to work with RPC client responses.parseResponse Utility
The new
parseResponse
utility provides a convenient way to parse responses from Hono RPC clients (hc
). It automatically handles different response formats and throws structured errors for failed requests.This makes working with RPC client responses much more straightforward and type-safe.
Thanks @NamesMT!
New features
All changes
iss
) claim by @yolocat-dev in #4253headerName
to JWK middleware by @JoaquinGimenez1 in #4279join
to correct path resolution by @yusukebe in #4291verifyWithJwks
for external use by @Beyondo in #4302parseResponse
util to smartly parsehc
's Response by @NamesMT in #4314skipLibCheck
to resolve TypeScript compilation issues by @yusukebe in #4342New Contributors
Full Changelog: honojs/hono@v4.8.12...v4.9.0
v4.8.12
Compare Source
What's Changed
/files/:name{.*}
by @yusukebe in #4329Full Changelog: honojs/hono@v4.8.11...v4.8.12
v4.8.11
Compare Source
What's Changed
output
type forc.body()
by @NamesMT in #4318FetchEvent
as second argument toapp.fetch
by @yusukebe in #4328@hono/eslint-config
by @yusukebe in #4330Full Changelog: honojs/hono@v4.8.10...v4.8.11
v4.8.10
Compare Source
What's Changed
benchmarks/*
by @yusukebe in #4317New Contributors
Full Changelog: honojs/hono@v4.8.9...v4.8.10
v4.8.9
Compare Source
What's Changed
isByteString
inc.redirect
by @yusukebe in #4307Full Changelog: honojs/hono@v4.8.8...v4.8.9
v4.8.8
Compare Source
What's Changed
safeEncodeURI
by @yusukebe in #4306Full Changelog: honojs/hono@v4.8.7...v4.8.8
v4.8.7
Compare Source
What's Changed
Full Changelog: honojs/hono@v4.8.6...v4.8.7
v4.8.6
Compare Source
What's Changed
Full Changelog: honojs/hono@v4.8.5...v4.8.6
v4.8.5
Compare Source
What's Changed
Full Changelog: honojs/hono@v4.8.4...v4.8.5
Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Copenhagen, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.