Description
hoppscotch is an open source API development ecosystem. Prior to version 2026.3.0, there is a stored XSS vulnerability in the team member overflow tooltip via display name. This issue has been patched in version 2026.3.0.
Published: 2026-04-02
Score: 5.4 Medium
EPSS: n/a
KEV: No
Impact: Stored cross‑site scripting via tooltip rendering of team member display names
Action: Patch
AI Analysis

Impact

A stored cross‑site scripting flaw exists in hoppscotch. When a team member’s display name is entered or edited, the characters appear in an overflow tooltip without proper escaping. Because the input is not sanitized, an attacker can embed malicious script that will execute in any user’s browser when the tooltip is hovered, potentially allowing data theft or defacement. This weakness matches the injection and rendering vulnerability class identified as CWE‑79.

Affected Systems

The vulnerability applies to the hoppscotch application. Every deployment using a build before version 2026.3.0 is vulnerable. The advisory lists hoppscotch as the affected product, and the fix is released in the 2026.3.0 release.

Risk and Exploitability

The CVSS score of 5.4 places it in the medium severity range and no EPSS score is provided. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to supply a malicious display name, which likely needs access to create or edit team member information—an operation that may be restricted to authorized users. Based on the description, the likely attack vector is application‑level interaction: an attacker who can influence the display name can inject code, and any user who hovers over the tooltip will execute the payload. The medium score combined with the requirement of user interaction indicates a non‑negligible risk for organizations running unpatched instances.

Generated by OpenCVE AI on April 2, 2026 at 22:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade hoppscotch to version 2026.3.0 or later.

Generated by OpenCVE AI on April 2, 2026 at 22:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Hoppscotch
Hoppscotch hoppscotch
Vendors & Products Hoppscotch
Hoppscotch hoppscotch

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description hoppscotch is an open source API development ecosystem. Prior to version 2026.3.0, there is a stored XSS vulnerability in the team member overflow tooltip via display name. This issue has been patched in version 2026.3.0.
Title hoppscotch: Stored XSS in team member overflow tooltip via display name
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Hoppscotch Hoppscotch
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T19:20:00.944Z

Reserved: 2026-03-30T20:52:53.285Z

Link: CVE-2026-34848

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-02T20:16:28.677

Modified: 2026-04-02T20:16:28.677

Link: CVE-2026-34848

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:16:18Z

Weaknesses