CVE-2025-62610
JavaScript vulnerability analysis and mitigation

Overview

Hono is a Web application framework that provides support for any JavaScript runtime. A vulnerability (CVE-2025-62610) was discovered in versions 1.1.0 to before 4.10.2, where Hono's JWT Auth Middleware lacked a built-in aud (Audience) verification option. This could lead to confused-deputy/token-mix-up issues, allowing an API to accept valid tokens intended for different audiences when multiple services share the same issuer/keys. The vulnerability was disclosed on October 21, 2025, and has been patched in version 4.10.2 (GitHub Advisory).

Technical details

The vulnerability stems from the JWT authentication middleware's failure to validate the aud (Audience) claim by default. The middleware's verifyOptions only enumerated iss, nbf, iat, and exp, without including an aud option. This omission violates RFC 7519 §4.1.3, which requires that when an aud claim is present, tokens MUST be rejected unless the processing party identifies itself in that claim. The vulnerability has been assigned a CVSS v3.1 score of 8.1 (High) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N (GitHub Advisory).

Impact

The vulnerability can lead to cross-service access where tokens intended for one service (Service B) could be accepted by another service (Service A). This particularly affects deployments with a single IdP/JWKS and shared keys across multiple services. For example, in implementations using Google Identity (OIDC), where the issuer is shared across applications, an attacker could potentially use a token obtained from one service to access another service with the victim's privileges (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in version 4.10.2. Users should upgrade to this version and enable RFC 7519-compliant audience validation using the new verification.aud option. The recommended secure configuration includes explicitly setting the audience verification in the JWT middleware configuration. For example: jwt({ secret: 'my-secret', verification: { aud: 'service-a' } }) (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62610HIGH8.1
  • JavaScriptJavaScript
  • hono
NoYesOct 22, 2025
CVE-2025-59837HIGH7.2
  • JavaScriptJavaScript
  • astro
NoYesOct 28, 2025
CVE-2025-62713HIGH7.2
  • JavaScriptJavaScript
  • @kottster/server
NoYesOct 23, 2025
GHSA-q7jf-gf43-6x6pMEDIUM6.5
  • JavaScriptJavaScript
  • hono
NoYesOct 24, 2025
CVE-2025-62517MEDIUM5.9
  • JavaScriptJavaScript
  • rollbar
NoYesOct 23, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management