Skip to content

chore(deps): bump hono from 4.12.4 to 4.12.18 in /apps/examples/hono-example#96

Open
dependabot[bot] wants to merge 1 commit into
mainfrom
dependabot/npm_and_yarn/apps/examples/hono-example/hono-4.12.18
Open

chore(deps): bump hono from 4.12.4 to 4.12.18 in /apps/examples/hono-example#96
dependabot[bot] wants to merge 1 commit into
mainfrom
dependabot/npm_and_yarn/apps/examples/hono-example/hono-4.12.18

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github May 9, 2026

Bumps hono from 4.12.4 to 4.12.18.

Release notes

Sourced from hono's releases.

v4.12.18

Security fixes

This release includes fixes for the following security issues:

Cache Middleware ignores Vary: Authorization / Vary: Cookie leading to cross-user cache leakage

Affects: Cache Middleware. Fixes missing cache-skip handling for Vary: Authorization and Vary: Cookie, where a response cached for one authenticated user could be served to other users. GHSA-p77w-8qqv-26rm

CSS Declaration Injection via Style Object Values in JSX SSR

Affects: hono/jsx. Fixes a missing CSS-context escape for style object values and property names, where untrusted input could inject additional CSS declarations. The impact is limited to CSS and does not allow JavaScript execution. GHSA-qp7p-654g-cw7p

Improper validation of NumericDate claims (exp, nbf, iat) in JWT verify()

Affects: hono/utils/jwt. Fixes improper validation of exp, nbf, and iat claims, where falsy, non-finite, or non-numeric values could silently bypass time-based checks instead of being rejected per RFC 7519. GHSA-hm8q-7f3q-5f36


Users who use the JWT helper, hono/jsx, or the Cache middleware are strongly encouraged to upgrade to this version.

v4.12.17

What's Changed

New Contributors

Full Changelog: honojs/hono@v4.12.16...v4.12.17

v4.12.16

Security fixes

This release includes fixes for the following security issues:

Unvalidated JSX Tag Names in hono/jsx May Allow HTML Injection

Affects: hono/jsx. Fixes missing validation of JSX tag names when using jsx() or createElement(), which could allow HTML injection if untrusted input is used as the tag name. GHSA-69xw-7hcm-h432

bodyLimit() can be bypassed for chunked / unknown-length requests

Affects: Body Limit Middleware. Fixes late enforcement for request bodies without a reliable Content-Length (e.g. chunked requests), where oversized requests could reach handlers and return successful responses before being rejected. GHSA-9vqf-7f2p-gf9v

v4.12.15

What's Changed

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Greptile Summary

This PR bumps hono from 4.12.4 to 4.12.18 in the Hono example app, pulling in a series of bug fixes and several security patches across the intermediate releases.

  • v4.12.16 fixes HTML injection via unvalidated JSX tag names and a bodyLimit() bypass for chunked requests.
  • v4.12.18 fixes cross-user cache leakage when Vary: Authorization/Vary: Cookie headers are present, CSS declaration injection via style object values in JSX SSR, and improper JWT NumericDate claim validation (exp, nbf, iat) that could silently bypass time-based checks.

Confidence Score: 5/5

Safe to merge — a straightforward patch-range version bump that resolves multiple known security vulnerabilities with no API-breaking changes.

The change is a single-line version bump in an example app's package.json. All fixes in the 4.12.4 → 4.12.18 range are backward-compatible patches, and the security issues addressed (JWT bypass, cache leakage, JSX injection, bodyLimit bypass) are genuine improvements with no risk of regression for existing usage.

No files require special attention.

Important Files Changed

Filename Overview
apps/examples/hono-example/package.json Bumps hono from 4.12.4 to 4.12.18, picking up multiple security fixes for JWT validation, JSX injection, cache leakage, and bodyLimit bypass.

Flowchart

%%{init: {'theme': 'neutral'}}%%
flowchart TD
    A["hono 4.12.4\n(previous)"] --> B["4.12.5 – 4.12.15\nbug fixes"]
    B --> C["4.12.16\n🔒 JSX tag name HTML injection fix\n🔒 bodyLimit bypass fix"]
    C --> D["4.12.17\nSVG attr normalization, CORS, type fixes"]
    D --> E["4.12.18\n🔒 Cache Vary leakage fix\n🔒 CSS injection in JSX SSR fix\n🔒 JWT NumericDate validation fix"]
    E --> F["hono 4.12.18\n(this PR)"]
Loading

Reviews (1): Last reviewed commit: "chore(deps): bump hono in /apps/examples..." | Re-trigger Greptile

Bumps [hono](https://github.com/honojs/hono) from 4.12.4 to 4.12.18.
- [Release notes](https://github.com/honojs/hono/releases)
- [Commits](honojs/hono@v4.12.4...v4.12.18)

---
updated-dependencies:
- dependency-name: hono
  dependency-version: 4.12.18
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels May 9, 2026
@dependabot dependabot Bot requested a review from endalk200 as a code owner May 9, 2026 03:54
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels May 9, 2026
@vercel
Copy link
Copy Markdown

vercel Bot commented May 9, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
better-webhook-docs Ready Ready Preview, Comment May 9, 2026 3:54am

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants