{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T21:36:43.752","vulnerabilities":[{"cve":{"id":"CVE-2026-29085","sourceIdentifier":"security-advisories@github.com","published":"2026-03-04T23:16:10.423","lastModified":"2026-03-06T18:03:12.037","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using streamSSE() in Streaming Helper, the event, id, and retry fields were not validated for carriage return (\\r) or newline (\\n) characters. Because the SSE protocol uses line breaks as field delimiters, this could allow injection of additional SSE fields within the same event frame if untrusted input was passed into these fields. This issue has been patched in version 4.12.4."},{"lang":"es","value":"Hono es un framework de aplicación web que proporciona soporte para cualquier entorno de ejecución de JavaScript. Antes de la versión 4.12.4, al usar streamSSE() en Streaming Helper, los campos event, id y retry no se validaban en busca de caracteres de retorno de carro (\\r) o nueva línea (\\n). Debido a que el protocolo SSE utiliza saltos de línea como delimitadores de campo, esto podría permitir la inyección de campos SSE adicionales dentro del mismo marco de evento si se pasaba entrada no confiable a estos campos. Este problema ha sido parcheado en la versión 4.12.4."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*","versionEndExcluding":"4.12.4","matchCriteriaId":"8ADA9966-4575-41CC-8905-E1F4E4CB5CA6"}]}]}],"references":[{"url":"https://github.com/honojs/hono/commit/f4123ed9ea3c7c52380cc99a079a4d773838846e","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/honojs/hono/security/advisories/GHSA-p6xx-57qc-3wxr","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}