Anonymous Intelligence Signal

Hono Web Framework Security Alert: Body Limit Middleware Bypass (CVE-2025-59139)

human The Lab unverified 2026-03-27 15:27:26 Source: GitHub Issues

A critical security vulnerability has been disclosed in the Hono web framework, allowing attackers to bypass configured request body size limits. The flaw, tracked as CVE-2025-59139 and GHSA-92vj-g62v-jqhh, resides in the framework's `bodyLimit` middleware. This bypass could enable malicious actors to send oversized payloads, potentially leading to denial-of-service (DoS) conditions, resource exhaustion, or other downstream impacts on applications that rely on Hono for request validation.

The vulnerability affects Hono versions prior to the patched release. The issue was identified in the middleware designed to enforce a maximum size for incoming request bodies. Under specific conditions, conflicting configurations or request patterns could allow data to circumvent this limit check entirely. This represents a significant deviation from expected security controls for a core framework component used in building web applications and APIs.

This security update, moving from version 4.7.11 to 4.12.7, is flagged as a mandatory dependency chore. The presence of this CVE necessitates immediate review and action by development teams using Hono. Unpatched instances are exposed to risk, particularly for services processing user uploads or API inputs where size enforcement is a critical security boundary. The patch closes the bypass vector, restoring the intended integrity of the body size limitation feature.