Description
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using streamSSE() in Streaming Helper, the event, id, and retry fields were not validated for carriage return (\r) or newline (\n) characters. Because the SSE protocol uses line breaks as field delimiters, this could allow injection of additional SSE fields within the same event frame if untrusted input was passed into these fields. This issue has been patched in version 4.12.4.
Published: 2026-03-04
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SSE Field Injection
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in Hono’s Streaming Helper function writeSSE(), which failed to escape carriage return and newline characters in the event, id, and retry fields. Because Server‑Sent Events rely on line breaks to separate fields, an attacker could inject malicious or additional fields into the same event frame. This flaw allows arbitrary field injection that could manipulate client‑side processing or reveal sensitive data, thereby compromising the confidentiality and integrity of the application data stream.

Affected Systems

Hono, the open‑source web framework for JavaScript, supported on any Node.js runtime. Versions prior to 4.12.4 are affected; the issue was patched in 4.12.4.

Risk and Exploitability

The CVSS score of 6.5 reflects a moderate severity. The EPSS score is less than 1%, indicating a very low probability of exploitation in the near term, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is likely remote, requiring an attacker to supply untrusted input to any of the SSE fields in a client‑facing endpoint. Exploitation would need the ability to influence these fields, such as through a form submission or API request, allowing the attacker to inject additional SSE directives.

Generated by OpenCVE AI on April 16, 2026 at 13:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Hono to version 4.12.4 or later to apply the vendor patch.
  • If an upgrade is not yet possible, implement server‑side validation to strip or encode any carriage return or newline characters from the event, id, and retry fields before sending them in an SSE response.
  • Review application code for any untrusted sources that populate these fields and ensure they are sanitized or use a trusted library that enforces field validation.

Generated by OpenCVE AI on April 16, 2026 at 13:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p6xx-57qc-3wxr Hono Vulnerable to SSE Control Field Injection via CR/LF in writeSSE()
History

Fri, 06 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*

Thu, 05 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Hono
Hono hono
Vendors & Products Hono
Hono hono

Wed, 04 Mar 2026 22:30:00 +0000

Type Values Removed Values Added
Description Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using streamSSE() in Streaming Helper, the event, id, and retry fields were not validated for carriage return (\r) or newline (\n) characters. Because the SSE protocol uses line breaks as field delimiters, this could allow injection of additional SSE fields within the same event frame if untrusted input was passed into these fields. This issue has been patched in version 4.12.4.
Title Hono: SSE Control Field Injection via CR/LF in writeSSE()
Weaknesses CWE-74
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-05T15:41:57.607Z

Reserved: 2026-03-03T20:51:43.484Z

Link: CVE-2026-29085

cve-icon Vulnrichment

Updated: 2026-03-05T15:39:28.393Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T23:16:10.423

Modified: 2026-03-06T18:03:12.037

Link: CVE-2026-29085

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:15:06Z

Weaknesses