INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h
Vulnerabilities

CVE-2026-28215

Critical ⚡ Exploit Available
hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, an unauthenticated attacker can overwrite the entire infrastructure configuration of a self-hosted Hoppscotch instanc
CWE-284 — Weakness Type
Published: Feb 26, 2026  ·  Modified: Mar 5, 2026  ·  Source: NVD
CVSS v3
9.1
🔗 NVD Official
📄 Description (English)

hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, an unauthenticated attacker can overwrite the entire infrastructure configuration of a self-hosted Hoppscotch instance including OAuth provider credentials and SMTP settings by sending a single HTTP POST request with no authentication. The endpoint POST /v1/onboarding/config has no authentication guard and performs no check on whether onboarding was already completed. A successful exploit allows the attacker to replace the instance's Google/GitHub/Microsoft OAuth application credentials with their own, causing all subsequent user logins via SSO to authenticate against the attacker's OAuth app. The attacker captures OAuth tokens and email addresses of every user who logs in after the exploit. Additionally, the endpoint returns a recovery token that can be used to read all stored secrets in plaintext, including SMTP passwords and any other configured credentials. Version 2026.2.0 fixes the issue.

🤖 AI Executive Summary

CVE-2026-28215 is a critical unauthenticated configuration override vulnerability in Hoppscotch prior to version 2026.2.0 that allows attackers to modify OAuth credentials and SMTP settings via an unprotected POST endpoint. This vulnerability enables credential theft, session hijacking, and exposure of sensitive infrastructure secrets through a single HTTP request.

📄 Description (Arabic)

يحتوي Hoppscotch على ثغرة حرجة في نقطة نهاية المتابعة حيث لا توجد حماية مصادقة أو فحوصات للتحقق من اكتمال عملية الإعداد. يمكن للمهاجمين استبدال بيانات اعتماد OAuth وإعدادات SMTP وسرقة رموز المصادقة وعناوين البريد الإلكتروني لجميع المستخدمين. تعرض الثغرة أيضاً رمز استرجاع يسمح بقراءة جميع الأسرار المخزنة بصيغة نصية عادية.

🤖 ملخص تنفيذي (AI)

هذا الثغرة الحرجة في Hoppscotch تسمح لمهاجمين غير مصرحين بتجاوز إعدادات البنية التحتية بما في ذلك بيانات اعتماد OAuth و SMTP. يمكن للمهاجمين اختطاف جلسات المستخدمين والوصول إلى جميع الأسرار المخزنة في النظام.

🤖 AI Intelligence Analysis Analyzed: Apr 12, 2026 21:52
🇸🇦 Saudi Arabia Impact Assessment
Saudi Relevance: high
🏢 Affected Saudi Sectors
banking telecom energy government healthcare
⚖️ Saudi Risk Score (AI)
10.0
/ 10.0
🔧 Remediation Steps (English)
Immediately upgrade Hoppscotch to version 2026.2.0 or later. Implement authentication guards on the POST /v1/onboarding/config endpoint. Verify OAuth provider credentials and SMTP settings post-upgrade. Rotate all OAuth application credentials and review user authentication logs for suspicious activity. Implement network-level access controls to restrict configuration endpoints.
🔧 خطوات المعالجة (العربية)
قم بالترقية الفورية إلى الإصدار 2026.2.0 أو أحدث. أضف حماية المصادقة على نقطة النهاية POST /v1/onboarding/config. تحقق من بيانات اعتماد OAuth وإعدادات SMTP بعد الترقية. أعد تعيين جميع بيانات اعتماد تطبيقات OAuth وراجع سجلات المصادقة للكشف عن النشاط المريب. طبق عناصر تحكم الوصول على مستوى الشبكة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5.1.1 5.1.2 5.2.1 5.3.1
🔵 SAMA CSF
AC-2 AC-3 AC-6 SI-4
🟡 ISO 27001:2022
A.9.1.1 A.9.2.1 A.9.4.1 A.14.2.1
📦 Affected Products / CPE 1 entries
hoppscotch:hoppscotch
📊 CVSS Score
9.1
/ 10.0 — Critical
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityN — None / Network
📋 Quick Facts
Severity Critical
CVSS Score9.1
CWECWE-284
EPSS0.07%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-02-26
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
10.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
exploit-available CWE-284
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.