Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.3
Hoppscotch API Ecosystem: Unauthorized Access to User Environments
CVE-2026-28216
Summary
A security issue in Hoppscotch allowed any logged-in user to view, modify, or delete another user's sensitive API keys and secrets. This was fixed in version 2026.2.0. Update to the latest version to protect your sensitive data.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| hoppscotch | hoppscotch | <= 2026.2.0 | – |
Original title
hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, any logged-in user can read, modify or delete another user's personal environment by ID. `user-environments.resolv...
Original description
hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, any logged-in user can read, modify or delete another user's personal environment by ID. `user-environments.resolver.ts:82-109`, `updateUserEnvironment` mutation uses `@UseGuards(GqlAuthGuard)` but is missing the `@GqlUser()` decorator entirely. The user's identity is never extracted, so the service receives only the environment ID and performs a `prisma.userEnvironment.update({ where: { id } })` without any ownership filter. `deleteUserEnvironment` does extract the user but the service only uses the UID to check if the target is a global environment. Actual delete query uses WHERE { id } without AND userUid. hoppscotch environments store API keys, auth tokens and secrets used in API requests. An authenticated attacker who obtains another user's environment ID can read their secrets, replace them with malicious values or delete them entirely. The environment ID format is CUID, which limits mass exploitation but insider threat and combined info leak scenarios are realistic. Version 2026.2.0 fixes the issue.
nvd CVSS3.1
8.3
Vulnerability type
CWE-639
Authorization Bypass Through User-Controlled Key
- https://github.com/hoppscotch/hoppscotch/releases/tag/2026.2.0 Product Release Notes
- https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-72rv-vc3j-5vqr Exploit Vendor Advisory
Published: 26 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026