Security Release
This release includes security fixes for multiple vulnerabilities in Hono and related middleware. We recommend upgrading if you are using any of the affected components.
Components
IP Restriction Middleware
Fixed an IPv4 address validation bypass that could allow IP-based access control to be bypassed under certain configurations.
Cache Middleware
Fixed an issue where responses marked with Cache-Control: private or no-store could be cached, potentially leading to information disclosure on some runtimes.
Serve Static Middleware (Cloudflare Workers adapter)
Fixed an issue that could allow unintended access to internal asset keys when serving static files with user-controlled paths.
hono/jsx ErrorBoundary
Fixed a reflected Cross-Site Scripting (XSS) issue in the ErrorBoundary component that could occur when untrusted strings were rendered without proper escaping.
Recommendation
Users are encouraged to upgrade to this release, especially if they:
- Use IP Restriction Middleware
- Use Cache Middleware on Deno, Bun, or Node.js
- Use Serve Static Middleware with user-controlled paths on Cloudflare Workers
- Render untrusted data inside
ErrorBoundarycomponents
Security Advisories & CVEs
-
IP Restriction Middleware – IPv4 address validation bypass
- Advisory: GHSA-r354-f388-2fhh
- CVE: CVE-2026-24398
-
Cache Middleware ignores
Cache-Control: private- Advisory: GHSA-6wqw-2p9w-4vw4
- CVE: CVE-2026-24472
-
Serve Static Middleware (Cloudflare Workers adapter) – Arbitrary key read
- Advisory: GHSA-w332-q679-j88p
- CVE: CVE-2026-24473
-
hono/jsx
ErrorBoundary– Cross-Site Scripting (XSS)- Advisory: GHSA-9r54-q6cx-xmh5
- CVE: Pending
Full Changelog: v4.11.6...v4.11.7