Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9vqf-7f2p-gf9v | Hono: bodyLimit() can be bypassed for chunked / unknown-length requests |
Wed, 13 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hono
Hono hono |
|
| CPEs | cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Hono
Hono hono |
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.16, bodyLimit() does not reliably enforce maxSize for requests without a usable Content-Length (e.g. Transfer-Encoding: chunked). Oversized requests can reach handlers and return 200 instead of 413. This vulnerability is fixed in 4.12.16. | |
| Title | Hono: bodyLimit() can be bypassed for chunked / unknown-length requests | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T15:31:19.896Z
Reserved: 2026-05-06T15:49:25.193Z
Link: CVE-2026-44456
Updated: 2026-05-13T15:31:15.252Z
Status : Analyzed
Published: 2026-05-13T16:16:57.567
Modified: 2026-05-13T18:34:43.090
Link: CVE-2026-44456
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:30:15Z
Github GHSA