Security Flaw in Hoppscotch Browser Extension Exposes User Data

CVE-2024-34714

7.6HIGH

Key Information

Vendor
Hoppscotch
Status
Hoppscotch-extension
Vendor
CVE Published:
14 May 2024

Summary

The Hoppscotch Browser Extension, designed for a community-driven API development ecosystem, has a significant vulnerability that arises from a critical oversight in the codebase. Specifically, during a recent update, the developers failed to implement essential checks for the approved origin list, thus allowing any website to communicate with the extension's internal APIs. This exposure results in the ability for malicious sites to bypass Cross-Origin Resource Sharing (CORS) restrictions by sending requests to the extension. Consequently, users of affected versions (0.34 and earlier) are at risk of unauthorized data access. The issue has been addressed in the latest release, version 0.35, while users are advised to review their extension access settings, particularly on Chrome, to restrict origins. Firefox users are urged to upgrade to the patched version for security.

Affected Version(s)

hoppscotch-extension = >= 0.28, < 0.35

References

CVSS V3.1

Score:
7.6
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.