Home

Description

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.18, improper validation of the JWT NumericDate claims exp, nbf, and iat in hono/utils/jwt allows tokens with non-spec-compliant claim values to silently bypass time-based checks. This issue is not exploitable by an anonymous attacker; it only manifests when a malformed claim value reaches verify() — typically when the application itself issues such tokens, or when the signing key is otherwise under attacker control. This vulnerability is fixed in 4.12.18.

PUBLISHED Reserved 2026-05-06 | Published 2026-05-13 | Updated 2026-05-13 | Assigner GitHub_M




LOW: 3.8CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-1284: Improper Validation of Specified Quantity in Input

Product status

< 4.12.18
affected

References

github.com/...s/hono/security/advisories/GHSA-hm8q-7f3q-5f36

cve.org (CVE-2026-44459)

nvd.nist.gov (CVE-2026-44459)

Download JSON