| ID |
CVE-2026-44459
|
| Sažetak |
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.18, improper validation of the JWT NumericDate claims exp, nbf, and iat in hono/utils/jwt allows tokens with non-spec-compliant claim values to silently bypass time-based checks. This issue is not exploitable by an anonymous attacker; it only manifests when a malformed claim value reaches verify() — typically when the application itself issues such tokens, or when the signing key is otherwise under attacker control. This vulnerability is fixed in 4.12.18. |
| Reference |
|
| CVSS |
| Base: | 3.8 |
| Impact: | 2.5 |
| Exploitability: | 1.2 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
LOW |
HIGH |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| LOW |
LOW |
NONE |
|
| CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N |
| Zadnje važnije ažuriranje |
13-05-2026 - 18:21 |
| Objavljeno |
13-05-2026 - 16:16 |