Hono.js Static Site Generator Vulnerability Exposes Path Traversal Risk (CVE-2026-39408)
A critical security flaw in the popular Hono.js web framework's static site generation feature has been disclosed, posing a direct risk of arbitrary file writes on affected systems. The vulnerability, tracked as CVE-2026-39408, resides within the `toSSG()` function. It allows an attacker to craft malicious dynamic route parameters that can cause generated files to be written outside the intended, secure output directory. This path traversal issue effectively breaks the security boundary of the static generation process, creating a vector for potential data corruption or system compromise.
The flaw specifically impacts the `ssgParams` functionality. When developers use this feature to pre-render pages with dynamic content, the framework fails to properly sanitize user-supplied parameter values. This oversight allows specially crafted input to manipulate the final file path, leading to directory traversal. The vulnerability was patched in Hono versions 4.12.10 through 4.12.12, with the update from 4.12.9 to 4.12.12 being flagged as a high-priority security dependency update by automated tools like Renovate.
This vulnerability places any application using Hono's static site generation for production builds at immediate risk. Developers and security teams must treat this as a pressing operational threat, as unpatched systems could allow malicious actors to overwrite critical files on the build server. The disclosure triggers a mandatory upgrade cycle for countless projects reliant on this modern JavaScript framework, highlighting the persistent security challenges in automated build toolchains and the software supply chain.