CVE-2026-29086: Hono Vulnerable to Cookie Attribute Injection via Unsanitized domain and path in setCookie()
(updated )
The setCookie() utility did not validate semicolons (;), carriage returns (\r), or newline characters (\n) in the domain and path options when constructing the Set-Cookie header.
Because cookie attributes are delimited by semicolons, this could allow injection of additional cookie attributes if untrusted input was passed into these fields.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-29086 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →