Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8.
References
Configurations
History
17 Sep 2025, 20:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17 - Product | |
References | () https://github.com/honojs/hono/commit/41ce840379516410dee60c783142e05bb5a22449 - Patch | |
References | () https://github.com/honojs/hono/security/advisories/GHSA-rpfr-3m35-5vx5 - Exploit, Vendor Advisory | |
First Time |
Hono hono
Hono |
|
CPE | cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:* |
Information
Published : 2024-08-22 15:15
Updated : 2025-09-17 20:34
NVD link : CVE-2024-43787
Mitre link : CVE-2024-43787
CVE.ORG link : CVE-2024-43787
JSON object : View
Products Affected
hono
- hono
CWE
CWE-352
Cross-Site Request Forgery (CSRF)