{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-24472","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-23T00:38:20.547Z","datePublished":"2026-01-27T19:34:33.065Z","dateUpdated":"2026-01-27T20:52:05.494Z"},"containers":{"cna":{"title":"Hono cache middleware ignores \"Cache-Control: private\" leading to Web Cache Deception","problemTypes":[{"descriptions":[{"cweId":"CWE-524","lang":"en","description":"CWE-524: Use of Cache Containing Sensitive Information","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-613","lang":"en","description":"CWE-613: Insufficient Session Expiration","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/honojs/hono/security/advisories/GHSA-6wqw-2p9w-4vw4","tags":["x_refsource_CONFIRM"],"url":"https://github.com/honojs/hono/security/advisories/GHSA-6wqw-2p9w-4vw4"},{"name":"https://github.com/honojs/hono/commit/12c511745b3f1e7a3f863a23ce5f921c7fa805d1","tags":["x_refsource_MISC"],"url":"https://github.com/honojs/hono/commit/12c511745b3f1e7a3f863a23ce5f921c7fa805d1"},{"name":"https://github.com/honojs/hono/releases/tag/v4.11.7","tags":["x_refsource_MISC"],"url":"https://github.com/honojs/hono/releases/tag/v4.11.7"}],"affected":[{"vendor":"honojs","product":"hono","versions":[{"version":"< 4.11.7","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-27T19:34:33.065Z"},"descriptions":[{"lang":"en","value":"Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, Cache Middleware contains an information disclosure vulnerability caused by improper handling of HTTP cache control directives. The middleware does not respect standard cache control headers such as `Cache-Control: private` or `Cache-Control: no-store`, which may result in private or authenticated responses being cached and subsequently exposed to unauthorized users. Version 4.11.7 has a patch for the issue."}],"source":{"advisory":"GHSA-6wqw-2p9w-4vw4","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-27T20:36:35.704091Z","id":"CVE-2026-24472","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-27T20:52:05.494Z"}}]}}