Description
Insufficient validation of Chrome extension identifiers in Raindrop.io Bookmark Manager Web App 5.6.76.0 allows attackers to obtain sensitive user data via a crafted request.
Published: 2026-04-22
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive data exposure by insufficient validation of Chrome extension identifiers
Action: Mitigate
AI Analysis

Impact

The flaw resides in the Raindrop.io Bookmark Manager Web App version 5.6.76.0. Because the server fails to validate the Chrome extension identifier supplied in a request, a forged identifier can be used to retrieve bookmark data that should be restricted to authenticated users. This weakness corresponds to CWE-20 and CWE-284, allowing improper input validation and access control that can expose private bookmark information.

Affected Systems

Only the Raindrop.io Bookmark Manager Web App version 5.6.76.0 is explicitly named in the CVE record; no other vendors or products are listed.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity and the EPSS score of <1% suggests a very low probability of exploitation. The likely attack vector is a crafted HTTP request that includes a forged Chrome extension identifier. Based on the description, it is inferred that an attacker could trigger this by directing a user’s browser or a malicious extension to send the request, as the server does not verify the identifier. Although the vulnerability is not listed in the CISA KEV catalog, the potential to expose private bookmark data warrants proactive mitigation.

Generated by OpenCVE AI on April 29, 2026 at 02:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Implement strict server‑side validation that checks each Chrome extension identifier against a known whitelist before processing the request.
  • Add authentication and authorization checks to the endpoint that accepts the extension identifier so that only legitimate users can retrieve bookmark data.
  • Configure network controls or a proxy to allow only whitelisted extension identifiers in requests to the affected endpoint.

Generated by OpenCVE AI on April 29, 2026 at 02:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Raindrop raindrop
CPEs cpe:2.3:a:raindrop:raindrop:5.6.76.0:*:*:*:*:chrome:*:*
Vendors & Products Raindrop raindrop

Wed, 29 Apr 2026 03:15:00 +0000

Type Values Removed Values Added
Title Insufficient validation of Chrome extension identifiers in Raindrop.io exposes user bookmark data

Wed, 29 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
Title Insufficient Validation of Chrome Extension Identifiers Leading to Sensitive Data Exposure
Weaknesses CWE-285

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Raindrop
Raindrop bookmark Manager Web App
Vendors & Products Raindrop
Raindrop bookmark Manager Web App

Wed, 22 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Title Insufficient Validation of Chrome Extension Identifiers Leading to Sensitive Data Exposure
Weaknesses CWE-285

Wed, 22 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-284
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description Insufficient validation of Chrome extension identifiers in Raindrop.io Bookmark Manager Web App 5.6.76.0 allows attackers to obtain sensitive user data via a crafted request.
References

Subscriptions

Raindrop Bookmark Manager Web App Raindrop
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T18:20:21.206Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31192

cve-icon Vulnrichment

Updated: 2026-04-22T18:17:52.476Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T14:16:36.420

Modified: 2026-05-12T20:14:47.603

Link: CVE-2026-31192

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T03:00:12Z

Weaknesses