{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-58362","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-08-29T16:19:59.010Z","datePublished":"2025-09-04T23:56:13.983Z","dateUpdated":"2025-09-05T16:05:20.545Z"},"containers":{"cna":{"title":"Hono contains a flaw in URL path parsing, potentially leading to path confusion","problemTypes":[{"descriptions":[{"cweId":"CWE-706","lang":"en","description":"CWE-706: Use of Incorrectly-Resolved Name or Reference","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/honojs/hono/security/advisories/GHSA-9hp6-4448-45g2","tags":["x_refsource_CONFIRM"],"url":"https://github.com/honojs/hono/security/advisories/GHSA-9hp6-4448-45g2"},{"name":"https://github.com/honojs/hono/commit/1d79aedc3f82d8c9969b115fe61bc4bd705ec8de","tags":["x_refsource_MISC"],"url":"https://github.com/honojs/hono/commit/1d79aedc3f82d8c9969b115fe61bc4bd705ec8de"},{"name":"https://github.com/honojs/hono/releases/tag/v4.9.6","tags":["x_refsource_MISC"],"url":"https://github.com/honojs/hono/releases/tag/v4.9.6"}],"affected":[{"vendor":"honojs","product":"hono","versions":[{"version":">= 4.8.0, < 4.9.6","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-09-04T23:56:13.983Z"},"descriptions":[{"lang":"en","value":"Hono is a Web application framework that provides support for any JavaScript runtime. Versions 4.8.0 through 4.9.5 contain a flaw in the getPath utility function which could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx location blocks). The original implementation relied on fixed character offsets when parsing request URLs. Under certain malformed absolute-form Request-URIs, this could lead to incorrect path extraction depending on the application and environment. If proxy ACLs are used to protect sensitive endpoints such as /admin, this flaw could have allowed unauthorized access. The confidentiality impact depends on what data is exposed: if sensitive administrative data is exposed, the impact may be high, otherwise it may be moderate. This issue is fixed in version 4.9.6."}],"source":{"advisory":"GHSA-9hp6-4448-45g2","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-05T16:05:11.603475Z","id":"CVE-2025-58362","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-05T16:05:20.545Z"}}]}}