build(deps): bump hono from 4.6.5 to 4.11.7 in /litellm-js/spend-logs by dependabot[bot] · Pull Request #29 · 1xcode/litellm
Bumps hono from 4.6.5 to 4.11.7.
Release notes
Sourced from hono's releases.
v4.11.7
Security Release
This release includes security fixes for multiple vulnerabilities in Hono and related middleware. We recommend upgrading if you are using any of the affected components.
Components
IP Restriction Middleware
Fixed an IPv4 address validation bypass that could allow IP-based access control to be bypassed under certain configurations.
Cache Middleware
Fixed an issue where responses marked with
Cache-Control: privateorno-storecould be cached, potentially leading to information disclosure on some runtimes.Serve Static Middleware (Cloudflare Workers adapter)
Fixed an issue that could allow unintended access to internal asset keys when serving static files with user-controlled paths.
hono/jsx
ErrorBoundaryFixed a reflected Cross-Site Scripting (XSS) issue in the
ErrorBoundarycomponent that could occur when untrusted strings were rendered without proper escaping.Recommendation
Users are encouraged to upgrade to this release, especially if they:
- Use IP Restriction Middleware
- Use Cache Middleware on Deno, Bun, or Node.js
- Use Serve Static Middleware with user-controlled paths on Cloudflare Workers
- Render untrusted data inside
ErrorBoundarycomponentsSecurity Advisories & CVEs
IP Restriction Middleware – IPv4 address validation bypass
- Advisory: GHSA-r354-f388-2fhh
- CVE: CVE-2026-24398
Cache Middleware ignores
Cache-Control: private
- Advisory: GHSA-6wqw-2p9w-4vw4
- CVE: CVE-2026-24472
Serve Static Middleware (Cloudflare Workers adapter) – Arbitrary key read
- Advisory: GHSA-w332-q679-j88p
- CVE: CVE-2026-24473
hono/jsx
ErrorBoundary– Cross-Site Scripting (XSS)
- Advisory: GHSA-9r54-q6cx-xmh5
- CVE: Pending
... (truncated)
Commits
f7d272a4.11.72cf6004Merge commit from forkcf9a78dMerge commit from forkedbf6eeMerge commit from fork12c5117Merge commit from fork73434874.11.6b6e5a97feat(bun): export getBunServer (#4626)2a9cd95fix(sse): handle\rand\r\nline endings in writeSSE (#4644)8078bbfdocs: align CODE_OF_CONDUCT.md wording with Contributor Covenant (#4630)a5be555refactor: useunique symbolfor more accurate typing. (#4651)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.