Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24472: CWE-524: Use of Cache Containing Sensitive Information in honojs hono

0
Medium
VulnerabilityCVE-2026-24472cvecve-2026-24472cwe-524cwe-613
Published: Tue Jan 27 2026 (01/27/2026, 19:34:33 UTC)
Source: CVE Database V5
Vendor/Project: honojs
Product: hono

Description

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, Cache Middleware contains an information disclosure vulnerability caused by improper handling of HTTP cache control directives. The middleware does not respect standard cache control headers such as `Cache-Control: private` or `Cache-Control: no-store`, which may result in private or authenticated responses being cached and subsequently exposed to unauthorized users. Version 4.11.7 has a patch for the issue.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:05:57 UTC

Technical Analysis

CVE-2026-24472 is a vulnerability in the honojs hono web application framework's Cache Middleware prior to version 4.11.7. The root cause is the middleware's failure to properly respect standard HTTP cache control directives, specifically 'Cache-Control: private' and 'Cache-Control: no-store'. These headers are designed to prevent sensitive or user-specific responses from being cached by shared caches or proxies. Due to this improper handling, responses containing private or authenticated information may be cached inadvertently. This cached data can then be served to unauthorized users, leading to information disclosure. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality. Exploitation requires no authentication or user interaction and can be performed remotely, increasing the risk. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the moderate impact and ease of exploitation. The issue was addressed in hono version 4.11.7 by correcting the cache middleware to honor cache control headers properly. No known exploits have been reported in the wild as of the publication date. The vulnerability is classified under CWE-524 (Information Exposure Through Cache) and CWE-613 (Insufficient Session Expiration).

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive or authenticated data through improperly cached HTTP responses. This could include personal data protected under GDPR, internal business information, or session-specific content. Exposure of such data may lead to privacy violations, regulatory penalties, reputational damage, and potential exploitation by attackers for further attacks such as session hijacking or social engineering. Since the vulnerability can be exploited remotely without authentication, it increases the attack surface for web applications using the affected hono versions. Organizations relying on honojs hono for critical web services or handling sensitive user data are particularly at risk. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Prompt patching is essential to mitigate these risks and maintain compliance with European data protection regulations.

Mitigation Recommendations

European organizations should immediately upgrade all instances of honojs hono to version 4.11.7 or later, where the cache middleware properly respects HTTP cache control headers. In addition, conduct a thorough review of web application caching policies to ensure sensitive responses are correctly marked with appropriate cache control headers such as 'Cache-Control: private', 'Cache-Control: no-store', and 'Pragma: no-cache'. Implement strict cache validation and expiration strategies on both server and proxy layers. Monitor web server and application logs for unusual cache-related behavior or unauthorized access patterns. Where feasible, employ web application firewalls (WAFs) configured to detect and block anomalous caching behavior. Educate development teams on secure cache management best practices to prevent recurrence. Finally, perform regular security assessments and penetration testing focused on caching mechanisms to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T00:38:20.547Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697917214623b1157c43bf90

Added to database: 1/27/2026, 7:50:57 PM

Last enriched: 1/27/2026, 8:05:57 PM

Last updated: 1/27/2026, 10:00:40 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats