{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:39:41.465","vulnerabilities":[{"cve":{"id":"CVE-2026-29086","sourceIdentifier":"security-advisories@github.com","published":"2026-03-04T23:16:10.593","lastModified":"2026-03-06T18:00:25.880","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, the setCookie() utility did not validate semicolons (;), carriage returns (\\r), or newline characters (\\n) in the domain and path options when constructing the Set-Cookie header. Because cookie attributes are delimited by semicolons, this could allow injection of additional cookie attributes if untrusted input was passed into these fields. This issue has been patched in version 4.12.4."},{"lang":"es","value":"Hono es un framework de aplicación web que proporciona soporte para cualquier entorno de ejecución de JavaScript. Antes de la versión 4.12.4, la utilidad setCookie() no validaba los puntos y coma (;), los retornos de carro (\\r) o los caracteres de nueva línea (\\n) en las opciones de dominio y ruta al construir la cabecera Set-Cookie. Dado que los atributos de las cookies están delimitados por puntos y coma, esto podría permitir la inyección de atributos de cookie adicionales si se pasaba una entrada no confiable a estos campos. Este problema ha sido parcheado en la versión 4.12.4."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-1113"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*","versionEndExcluding":"4.12.4","matchCriteriaId":"8ADA9966-4575-41CC-8905-E1F4E4CB5CA6"}]}]}],"references":[{"url":"https://github.com/honojs/hono/commit/44ae0c8cc4d5ab2bed529127a4ac72e1483ad073","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/honojs/hono/security/advisories/GHSA-5pq2-9x2x-5p6w","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}