CVE-2026-28215
Hoppscotch · Hoppscotch
A critical flaw in Hoppscotch allows unauthenticated attackers to overwrite infrastructure configurations via the onboarding endpoint, leading to SSO hijacking and full credential exposure.
Executive summary
An unauthenticated configuration overwrite vulnerability in Hoppscotch allows attackers to hijack OAuth authentication and steal sensitive recovery tokens, leading to a total instance compromise.
Vulnerability
This vulnerability resides in the POST /v1/onboarding/config endpoint, which lacks authentication guards and fails to verify if onboarding is complete. An unauthenticated attacker can send a single HTTP request to replace OAuth credentials and retrieve a plaintext recovery token for all stored secrets.
Business impact
A successful exploit allows an attacker to intercept OAuth tokens and email addresses for all users logging in via SSO. By replacing legitimate credentials with their own, the attacker gains persistent access to user accounts and sensitive infrastructure secrets, including SMTP passwords. With a CVSS score of 9.1, this represents a critical risk to data confidentiality and system integrity.
Remediation
Immediate Action: Update the self-hosted Hoppscotch instance to version 2026.2.0 or later immediately to close the vulnerable onboarding endpoint.
Proactive Monitoring: Review access logs for unauthorized POST requests to the /v1/onboarding/config endpoint and monitor for unexpected changes in OAuth provider settings.
Compensating Controls: Restrict access to the Hoppscotch management interface using network-level access control lists (ACLs) or a VPN until the update is applied.
Exploitation status
Public Exploit Available: No
Analyst recommendation
This vulnerability presents a catastrophic risk to identity management and data privacy within self-hosted environments. It is imperative that administrators apply the version 2026.2.0 patch immediately to prevent unauthorized configuration changes and SSO hijacking.