Hono, a web framework, prior to version 4.6.5 is vulnerable to bypass of cross-site request forgery (CSRF) middleware by a request without Content-Type header. Although the CSRF middleware verifies the Content-Type Header, Hono always considers a request without a Content-Type header to be safe. This can allow an attacker to bypass CSRF protection implemented with Hono CSRF middleware. Version 4.6.5 fixes this issue.
References
Configurations
History
17 Sep 2025, 20:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/honojs/hono/blob/cebf4e87f3984a6a034e60a43f542b4c5225b668/src/middleware/csrf/index.ts#L76-L89 - Product | |
References | () https://github.com/honojs/hono/commit/aa50e0ab77b5af8c53c50fe3b271892f8eeeea82 - Patch | |
References | () https://github.com/honojs/hono/security/advisories/GHSA-2234-fmw7-43wr - Exploit, Vendor Advisory | |
First Time |
Hono hono
Hono |
|
CPE | cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:* |
Information
Published : 2024-10-15 16:15
Updated : 2025-09-17 20:35
NVD link : CVE-2024-48913
Mitre link : CVE-2024-48913
CVE.ORG link : CVE-2024-48913
JSON object : View
Products Affected
hono
- hono
CWE
CWE-352
Cross-Site Request Forgery (CSRF)