Vulnerability Description
hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, the `userCollection` GraphQL query accepts an arbitrary collection ID and returns the full collection data — including title, type, and the serialized `data` field containing HTTP requests with headers and potentially secrets — to any authenticated user, without verifying that the requesting user owns the collection. This is an Insecure Direct Object Reference (IDOR) caused by a missing authorization check that exists on every other operation in the same resolver. Version 2026.2.0 fixes the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hoppscotch | Hoppscotch | < 2026.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/hoppscotch/hoppscotch/releases/tag/2026.2.0ProductRelease Notes
- https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-m5pg-r4jp-qq75ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-28217?
CVE-2026-28217 is a vulnerability with a CVSS score of 6.5 (MEDIUM). hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, the `userCollection` GraphQL query accepts an arbitrary collection ID and returns the full collection data — includin...
How severe is CVE-2026-28217?
CVE-2026-28217 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28217?
Check the references section above for vendor advisories and patch information. Affected products include: Hoppscotch Hoppscotch.