

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.11.4, there is a flaw in Hono’s JWK/JWKS JWT verification middl…
Published:
12 January 2026 at 23:00:00
Alert date:
13 January 2026 at 21:04:42
Source:
nvd.nist.gov
Web Technologies
CVE-2026-22817 affects Hono Web application framework versions prior to 4.11.4. The vulnerability exists in the JWK/JWKS JWT verification middleware where the JWT header's algorithm value could influence signature verification when the selected JWK did not specify an algorithm. This flaw enables JWT algorithm confusion attacks, potentially allowing forged tokens to be accepted in certain configurations. The fix requires explicit specification of the algorithm option in JWT middleware to prevent algorithm confusion by ensuring verification algorithms are not derived from untrusted JWT header values.
Technical details
Mitigation steps:
Affected products:
Hono
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-22817
https://github.com/honojs/hono/commit/cc0aa7ae327ed84cc391d29086dec2a3e44e7a1f
https://github.com/honojs/hono/security/advisories/GHSA-f67f-6cw9-8mq4
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.

