No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p6xx-57qc-3wxr | Hono Vulnerable to SSE Control Field Injection via CR/LF in writeSSE() |
Fri, 06 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:* |
Thu, 05 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hono
Hono hono |
|
| Vendors & Products |
Hono
Hono hono |
Wed, 04 Mar 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using streamSSE() in Streaming Helper, the event, id, and retry fields were not validated for carriage return (\r) or newline (\n) characters. Because the SSE protocol uses line breaks as field delimiters, this could allow injection of additional SSE fields within the same event frame if untrusted input was passed into these fields. This issue has been patched in version 4.12.4. | |
| Title | Hono: SSE Control Field Injection via CR/LF in writeSSE() | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-05T15:41:57.607Z
Reserved: 2026-03-03T20:51:43.484Z
Link: CVE-2026-29085
Updated: 2026-03-05T15:39:28.393Z
Status : Analyzed
Published: 2026-03-04T23:16:10.423
Modified: 2026-03-06T18:03:12.037
Link: CVE-2026-29085
No data.
OpenCVE Enrichment
Updated: 2026-03-05T09:05:35Z
Github GHSA