Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-29045
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Hono: Arbitrary file access via serveStatic vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using serveStatic together with route-based middleware protections (e.g. app.use('/admin/*', ...)), inconsistent URL decoding allowed protected static resources to be accessed without authorization. The router used decodeURI, while serveStatic used decodeURIComponent. This mismatch allowed paths containing encoded slashes (%2F) to bypass middleware protections while still resolving to the intended filesystem path. This issue has been patched in version 4.12.4.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
URL编码处理不恰当(Hex编码)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Hono 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Hono是Hono社区的一个用 TypeScript 编写的 Web 框架。 Hono 4.12.4之前版本存在安全漏洞,该漏洞源于使用serveStatic与基于路由的中间件保护时URL解码不一致,可能导致包含编码斜杠的路径绕过中间件保护,从而未经授权访问受保护的静态资源。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
honojshono < 4.12.4 -
II. Public POCs for CVE-2026-29045
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
kimi-k2.5 · 8586 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month
III. Intelligence Information for CVE-2026-29045
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-29045

No comments yet


Leave a comment