VulnerAlert



APPLICATION
MICROSOFT
26-02-2026 23:08

CVE-2026-28215 Vulnerabilidad documentada

Sin puntuación
Tags
#exploit
#using
#source
#open
#google
#github
#git
#form
#config
#add
#microsoft
#application
#develop
#/git(.*)config/iU
#git config
#authenticated
#pass
#password
#issue
#fix
#configuration
#allow
#attack
Descripción
hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, unauthenticated attacker can overwrite the entire infrastructure configuration of a self-hosted Hoppscotch instance including OAuth provider credentials and SMTP settings by sending single HTTP POST request with no authentication. The endpoint /v1/onboarding/config has authentication guard performs check on whether onboarding was already completed. A successful exploit allows replace instance's Google/GitHub/Microsoft application their own, causing all subsequent user logins via SSO authenticate against attacker's app. captures tokens email addresses every who logs in after exploit. Additionally, returns recovery token that be used read stored secrets plaintext, passwords any other configured credentials. Version 2026.2.0 fixes issue.
https://github.com/hoppscotch/hoppscotch/releases/tag/2026.2.0
https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-jwv8-867r-q9fg
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2026-28215
Resultados similares
Coincidentes en almenos en 50% de los tags
16-03-2026 CVE-2016-20030
ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows unauthenticated ...
Ver información
16-03-2026 CVE-2016-20029
ZKTeco ZKBioSecurity 3.0 contains a file path manipulation vulnerability that allows attackers ...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por