Impact
A Cross‑Site Scripting flaw exists in the ErrorBoundary component of the Hono JavaScript framework. When certain user‑controlled strings reach this component, they can be rendered directly as raw HTML, which allows an attacker to inject and execute arbitrary code in the browser of a victim viewing the page. The flaw permits arbitrary script execution in the victim’s browser when malicious input reaches the component.
Affected Systems
Developers deploying the Hono framework on JavaScript runtimes are affected. The flaw appears in all releases prior to version 4.11.7 of the Hono library. Updating to 4.11.7 or newer removes the vulnerability.
Risk and Exploitability
The CVSS score of 4.7 indicates moderate severity, and the EPSS score of less than 1% suggests a very low probability of exploitation in the field. The flaw is not currently listed in the CISA KEV catalog. Exploitation would likely involve submitting crafted input that reaches the ErrorBoundary component, which then renders it as raw HTML in the client’s browser.
OpenCVE Enrichment
Github GHSA