hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, the `userCollection` GraphQL query accepts an arbitrary collection ID and returns the full collection data — including title, type, and the serialized `data` field containing HTTP requests with headers and potentially secrets — to any authenticated user, without verifying that the requesting user owns the collection. This is an Insecure Direct Object Reference (IDOR) caused by a missing authorization check that exists on every other operation in the same resolver. Version 2026.2.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/hoppscotch/hoppscotch/releases/tag/2026.2.0 | Product Release Notes |
| https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-m5pg-r4jp-qq75 | Exploit Mitigation Vendor Advisory |
Configurations
History
27 Feb 2026, 15:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:hoppscotch:hoppscotch:*:*:*:*:*:*:*:* | |
| CWE | CWE-639 | |
| First Time |
Hoppscotch
Hoppscotch hoppscotch |
|
| References | () https://github.com/hoppscotch/hoppscotch/releases/tag/2026.2.0 - Product, Release Notes | |
| References | () https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-m5pg-r4jp-qq75 - Exploit, Mitigation, Vendor Advisory |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 23:16
Updated : 2026-02-27 15:50
NVD link : CVE-2026-28217
Mitre link : CVE-2026-28217
CVE.ORG link : CVE-2026-28217
JSON object : View
Products Affected
hoppscotch
- hoppscotch
