Description
hoppscotch is an open source API development ecosystem. Prior to version 2026.3.0, there is a stored XSS vulnerability that can lead to CSRF. This issue has been patched in version 2026.3.0.
Published: 2026-04-02
Score: 8.5 High
EPSS: n/a
KEV: No
Impact: Stored Cross‑Site Scripting potentially leading to CSRF
Action: Immediate Patch
AI Analysis

Impact

A stored cross‑site scripting flaw is present in the mock server functionality of the hoppscotch API development ecosystem. The flaw allows an attacker to embed malicious script into a mock server response that is served from the backend origin. When a user loads the affected response, the injected script runs in the user’s browser with the user’s credentials, enabling unauthorized manipulation of the page and execution of additional actions such as submitting forms or accessing session data. Due to the script’s ability to perform actions on behalf of the user, it can also facilitate cross‑site request forgery attacks, further compromising the integrity and confidentiality of the user’s data.

Affected Systems

The vulnerability affects any deployment of hoppscotch that utilizes the mock server feature, specifically versions released before 2026.3.0. All users of the hoppscotch ecosystem running an earlier release are subject to the stored XSS risk. The remediation is provided in the 2026.3.0 release, which removes the exploitable code path.

Risk and Exploitability

With a CVSS score of 8.5 the flaw is considered high severity. Although an EPSS score is not available and it is not listed in the CISA KEV catalog, the nature of stored XSS means that an attacker can embed payloads that survive until a user interacts with the mock response. Successful exploitation requires the victim to view a crafted response, which makes the attack public‑web friendly in environments where the mock server is exposed to external users. Organizations should treat this as a high‑risk vulnerability and apply the patch promptly to eliminate the possibility of script injection and the secondary risk of CSRF.

Generated by OpenCVE AI on April 2, 2026 at 22:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade hoppscotch to version 2026.3.0 or later.

Generated by OpenCVE AI on April 2, 2026 at 22:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Hoppscotch
Hoppscotch hoppscotch
Vendors & Products Hoppscotch
Hoppscotch hoppscotch

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description hoppscotch is an open source API development ecosystem. Prior to version 2026.3.0, there is a stored XSS vulnerability that can lead to CSRF. This issue has been patched in version 2026.3.0.
Title hoppscotch: Stored XSS via mock server responses on backend origin
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Hoppscotch Hoppscotch
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T19:19:15.697Z

Reserved: 2026-03-31T17:27:08.659Z

Link: CVE-2026-34932

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-02T20:16:28.973

Modified: 2026-04-02T20:16:28.973

Link: CVE-2026-34932

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:16:19Z

Weaknesses