Home

Description

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.16, Improper handling of JSX element tag names in hono/jsx allowed unvalidated tag names to be directly inserted into the generated HTML output. When untrusted input is used as a tag name via the programmatic jsx() or createElement() APIs during server-side rendering, specially crafted values may break out of the intended element context and inject unintended HTML. This vulnerability is fixed in 4.12.16.

PUBLISHED Reserved 2026-05-06 | Published 2026-05-13 | Updated 2026-05-14 | Assigner GitHub_M




MEDIUM: 4.7CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Product status

< 4.12.16
affected

References

github.com/...s/hono/security/advisories/GHSA-69xw-7hcm-h432

cve.org (CVE-2026-44455)

nvd.nist.gov (CVE-2026-44455)

Download JSON