{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T12:02:04.300","vulnerabilities":[{"cve":{"id":"CVE-2026-24472","sourceIdentifier":"security-advisories@github.com","published":"2026-01-27T20:16:22.950","lastModified":"2026-02-04T15:32:14.550","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, Cache Middleware contains an information disclosure vulnerability caused by improper handling of HTTP cache control directives. The middleware does not respect standard cache control headers such as `Cache-Control: private` or `Cache-Control: no-store`, which may result in private or authenticated responses being cached and subsequently exposed to unauthorized users. Version 4.11.7 has a patch for the issue."},{"lang":"es","value":"Hono es un framework de aplicación web que proporciona soporte para cualquier entorno de ejecución de JavaScript. Antes de la versión 4.11.7, el Middleware de Caché contiene una vulnerabilidad de revelación de información causada por un manejo inadecuado de las directivas de control de caché HTTP. El middleware no respeta los encabezados de control de caché estándar como 'Cache-Control: private' o 'Cache-Control: no-store', lo que puede resultar en que respuestas privadas o autenticadas sean almacenadas en caché y posteriormente expuestas a usuarios no autorizados. La versión 4.11.7 tiene un parche para el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-524"},{"lang":"en","value":"CWE-613"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*","versionEndExcluding":"4.11.7","matchCriteriaId":"D0406A9F-E15B-452E-940A-ABF25EEAA871"}]}]}],"references":[{"url":"https://github.com/honojs/hono/commit/12c511745b3f1e7a3f863a23ce5f921c7fa805d1","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/honojs/hono/releases/tag/v4.11.7","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/honojs/hono/security/advisories/GHSA-6wqw-2p9w-4vw4","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}