CVE-2024-27092
Content spoofing - real Hoppscotch emails
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Hoppscotch is an API development ecosystem. Due to lack of validation for fields like Label (Edit Team) - TeamName, bad actors can send emails with Spoofed Content as Hoppscotch. Part of payload (external link) is presented in clickable form - easier to achieve own goals by malicious actors. This issue is fixed in 2023.12.6.
Hoppscotch es un ecosistema de desarrollo de API. Debido a la falta de validación de campos como Etiqueta (Editar equipo) - Nombre del equipo, los delincuentes pueden enviar correos electrónicos con contenido falsificado como Rayuela. Parte de el payload (enlace externo) se presenta en un formato en el que se puede hacer clic, lo que facilita que los actores malintencionados alcancen sus propios objetivos. Este problema se solucionó en 2023.12.6.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-02-19 CVE Reserved
- 2024-02-26 CVE Published
- 2024-08-02 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hoppscotch Search vendor "Hoppscotch" | Hoppscotch Search vendor "Hoppscotch" for product "Hoppscotch" | * | - |
Affected
|