Update dependency hono to v4.9.7 [SECURITY] #888
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.8.12
->4.9.7
GitHub Vulnerability Alerts
CVE-2025-58362
Summary
A flaw in the
getPath
utility function could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx location blocks).Details
The original implementation relied on fixed character offsets when parsing request URLs. Under certain malformed absolute-form Request-URIs, this could lead to incorrect path extraction.
Most standards-compliant runtimes and reverse proxies reject such malformed requests with a 400 Bad Request, so the impact depends on the application and environment.
Impact
If proxy ACLs are used to protect sensitive endpoints such as
/admin
, this flaw could have allowed unauthorized access. The confidentiality impact depends on what data is exposed: if sensitive administrative data is exposed, the impact may be High (CVSS 7.5); otherwise it may be Medium (CVSS 5.3).Resolution
The implementation has been updated to correctly locate the first slash after "://", preventing such path confusion.
CVE-2025-59139
Summary
A flaw in the
bodyLimit
middleware could allow bypassing the configured request body size limit when conflicting HTTP headers were present.Details
The middleware previously prioritized the
Content-Length
header even when aTransfer-Encoding: chunked
header was also included. According to the HTTP specification,Content-Length
must be ignored in such cases. This discrepancy could allow oversized request bodies to bypass the configured limit.Most standards-compliant runtimes and reverse proxies may reject such malformed requests with
400 Bad Request
, so the practical impact depends on the runtime and deployment environment.Impact
If body size limits are used as a safeguard against large or malicious requests, this flaw could allow attackers to send oversized request bodies. The primary risk is denial of service (DoS) due to excessive memory or CPU consumption when handling very large requests.
Resolution
The implementation has been updated to align with the HTTP specification, ensuring that
Transfer-Encoding
takes precedence overContent-Length
. The issue is fixed in Hono v4.9.7, and all users should upgrade immediately.Release Notes
honojs/hono (hono)
v4.9.7
Compare Source
Security
bodyLimit
middleware where the body size limit could be bypassed when bothContent-Length
andTransfer-Encoding
headers were present. If you are using this middleware, please update immediately. Security AdvisoryWhat's Changed
parseResponse
not parsing json in react native by @lr0pb in #4399.tool-versions
file by @3w36zj6 in #4397bun install
commands to use--frozen-lockfile
by @3w36zj6 in #4398New Contributors
Full Changelog: honojs/hono@v4.9.6...v4.9.7
v4.9.6
Compare Source
Security
Fixed a bug in URL path parsing (
getPath
) that could cause path confusion under malformed requests.If you rely on reverse proxies (e.g. Nginx) for ACLs or restrict access to endpoints like
/admin
, please update immediately.See advisory for details: GHSA-9hp6-4448-45g2
What's Changed
Full Changelog: honojs/hono@v4.9.5...v4.9.6
v4.9.5
Compare Source
What's Changed
origin
andallowMethods
by @jobrk in #4373app.fetch
inhandle
by @yusukebe in #4374New Contributors
Full Changelog: honojs/hono@v4.9.4...v4.9.5
v4.9.4
Compare Source
What's Changed
deno publish
by @yusukebe in #4364Full Changelog: honojs/hono@v4.9.3...v4.9.4
v4.9.3
Compare Source
What's Changed
customFetch
option to allow custom fetch function by @yusukebe in #4360typescript
to5.9.2
by @yusukebe in #4362packageManager
field topackage.json
by @yusukebe in #4363Full Changelog: honojs/hono@v4.9.2...v4.9.3
v4.9.2
Compare Source
What's Changed
removeIndexString
by @yusukebe in #4352New Contributors
Full Changelog: honojs/hono@v4.9.1...v4.9.2
v4.9.1
Compare Source
What's Changed
DetailedError.name
(+ error tests) by @NamesMT in #4344Full Changelog: honojs/hono@v4.9.0...v4.9.1
v4.9.0
Compare Source
Release Notes
Hono v4.9.0 is now available!
This release introduces several enhancements and utilities.
The main highlight is the new
parseResponse
utility that makes it easier to work with RPC client responses.parseResponse Utility
The new
parseResponse
utility provides a convenient way to parse responses from Hono RPC clients (hc
). It automatically handles different response formats and throws structured errors for failed requests.This makes working with RPC client responses much more straightforward and type-safe.
Thanks @NamesMT!
New features
All changes
iss
) claim by @yolocat-dev in #4253headerName
to JWK middleware by @JoaquinGimenez1 in #4279join
to correct path resolution by @yusukebe in #4291verifyWithJwks
for external use by @Beyondo in #4302parseResponse
util to smartly parsehc
's Response by @NamesMT in #4314skipLibCheck
to resolve TypeScript compilation issues by @yusukebe in #4342New Contributors
Full Changelog: honojs/hono@v4.8.12...v4.9.0
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.