Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:hoppscotch:hoppscotch:*:*:*:*:*:*:*:* |
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hoppscotch
Hoppscotch hoppscotch |
|
| Vendors & Products |
Hoppscotch
Hoppscotch hoppscotch |
Thu, 26 Feb 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, the `userCollection` GraphQL query accepts an arbitrary collection ID and returns the full collection data — including title, type, and the serialized `data` field containing HTTP requests with headers and potentially secrets — to any authenticated user, without verifying that the requesting user owns the collection. This is an Insecure Direct Object Reference (IDOR) caused by a missing authorization check that exists on every other operation in the same resolver. Version 2026.2.0 fixes the issue. | |
| Title | IDOR in GraphQL userCollection Query Exposes Other Users' Private Collections | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-27T18:42:07.857Z
Reserved: 2026-02-25T15:28:40.649Z
Link: CVE-2026-28217
Updated: 2026-02-27T18:42:00.511Z
Status : Analyzed
Published: 2026-02-26T23:16:36.263
Modified: 2026-02-27T15:50:55.187
Link: CVE-2026-28217
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:15:21Z