chore(deps): update dependency hono to v4.9.6 [security] #34
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.8.4->4.9.6GitHub Vulnerability Alerts
CVE-2025-58362
Summary
A flaw in the
getPathutility function could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx location blocks).Details
The original implementation relied on fixed character offsets when parsing request URLs. Under certain malformed absolute-form Request-URIs, this could lead to incorrect path extraction.
Most standards-compliant runtimes and reverse proxies reject such malformed requests with a 400 Bad Request, so the impact depends on the application and environment.
Impact
If proxy ACLs are used to protect sensitive endpoints such as
/admin, this flaw could have allowed unauthorized access. The confidentiality impact depends on what data is exposed: if sensitive administrative data is exposed, the impact may be High (CVSS 7.5); otherwise it may be Medium (CVSS 5.3).Resolution
The implementation has been updated to correctly locate the first slash after "://", preventing such path confusion.
Hono's flaw in URL path parsing could cause path confusion
CVE-2025-58362 / GHSA-9hp6-4448-45g2
More information
Details
Summary
A flaw in the
getPathutility function could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx location blocks).Details
The original implementation relied on fixed character offsets when parsing request URLs. Under certain malformed absolute-form Request-URIs, this could lead to incorrect path extraction.
Most standards-compliant runtimes and reverse proxies reject such malformed requests with a 400 Bad Request, so the impact depends on the application and environment.
Impact
If proxy ACLs are used to protect sensitive endpoints such as
/admin, this flaw could have allowed unauthorized access. The confidentiality impact depends on what data is exposed: if sensitive administrative data is exposed, the impact may be High (CVSS 7.5); otherwise it may be Medium (CVSS 5.3).Resolution
The implementation has been updated to correctly locate the first slash after "://", preventing such path confusion.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
honojs/hono (hono)
v4.9.6Compare Source
Security
Fixed a bug in URL path parsing (
getPath) that could cause path confusion under malformed requests.If you rely on reverse proxies (e.g. Nginx) for ACLs or restrict access to endpoints like
/admin, please update immediately.See advisory for details: GHSA-9hp6-4448-45g2
What's Changed
Full Changelog: honojs/hono@v4.9.5...v4.9.6
v4.9.5Compare Source
What's Changed
originandallowMethodsby @jobrk in #4373app.fetchinhandleby @yusukebe in #4374New Contributors
Full Changelog: honojs/hono@v4.9.4...v4.9.5
v4.9.4Compare Source
What's Changed
deno publishby @yusukebe in #4364Full Changelog: honojs/hono@v4.9.3...v4.9.4
v4.9.3Compare Source
What's Changed
customFetchoption to allow custom fetch function by @yusukebe in #4360typescriptto5.9.2by @yusukebe in #4362packageManagerfield topackage.jsonby @yusukebe in #4363Full Changelog: honojs/hono@v4.9.2...v4.9.3
v4.9.2Compare Source
What's Changed
removeIndexStringby @yusukebe in #4352New Contributors
Full Changelog: honojs/hono@v4.9.1...v4.9.2
v4.9.1Compare Source
What's Changed
DetailedError.name(+ error tests) by @NamesMT in #4344Full Changelog: honojs/hono@v4.9.0...v4.9.1
v4.9.0Compare Source
Release Notes
Hono v4.9.0 is now available!
This release introduces several enhancements and utilities.
The main highlight is the new
parseResponseutility that makes it easier to work with RPC client responses.parseResponse Utility
The new
parseResponseutility provides a convenient way to parse responses from Hono RPC clients (hc). It automatically handles different response formats and throws structured errors for failed requests.This makes working with RPC client responses much more straightforward and type-safe.
Thanks @NamesMT!
New features
All changes
iss) claim by @yolocat-dev in #4253headerNameto JWK middleware by @JoaquinGimenez1 in #4279jointo correct path resolution by @yusukebe in #4291verifyWithJwksfor external use by @Beyondo in #4302parseResponseutil to smartly parsehc's Response by @NamesMT in #4314skipLibCheckto resolve TypeScript compilation issues by @yusukebe in #4342New Contributors
Full Changelog: honojs/hono@v4.8.12...v4.9.0
v4.8.12Compare Source
What's Changed
/files/:name{.*}by @yusukebe in #4329Full Changelog: honojs/hono@v4.8.11...v4.8.12
v4.8.11Compare Source
What's Changed
outputtype forc.body()by @NamesMT in #4318FetchEventas second argument toapp.fetchby @yusukebe in #4328@hono/eslint-configby @yusukebe in #4330Full Changelog: honojs/hono@v4.8.10...v4.8.11
v4.8.10Compare Source
What's Changed
benchmarks/*by @yusukebe in #4317New Contributors
Full Changelog: honojs/hono@v4.8.9...v4.8.10
v4.8.9Compare Source
What's Changed
isByteStringinc.redirectby @yusukebe in #4307Full Changelog: honojs/hono@v4.8.8...v4.8.9
v4.8.8Compare Source
What's Changed
safeEncodeURIby @yusukebe in #4306Full Changelog: honojs/hono@v4.8.7...v4.8.8
v4.8.7Compare Source
What's Changed
Full Changelog: honojs/hono@v4.8.6...v4.8.7
v4.8.6Compare Source
What's Changed
Full Changelog: honojs/hono@v4.8.5...v4.8.6
v4.8.5Compare Source
What's Changed
Full Changelog: honojs/hono@v4.8.4...v4.8.5
Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Copenhagen, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.