Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| hoppscotch | hoppscotch | < 2026.3.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Hoppscotch <= 2026.2.1 is vulnerable to a DOM-based open redirect on the /enter page. The redirect query parameter is passed directly to windowz location.href with no origin validation. Requires one additional query parameter to trigger. Exploited via a crafted URL such as /enter?redirect=evil.com&foo=bar. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-34847.yaml | POC Details |
| 2 | Appsmith <= v1.97 instance management API endpoints are accessible without authentication, allowing an attacker to obtain sensitive information such as license plan, instance ID, authentication providers, feature flags, and configuration metadata via unauthenticated requests to specific API endpoints. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/appsmith/appsmith-info-disclosure.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-34848 | 5.4 MEDIUM | hoppscotch: Stored XSS in team member overflow tooltip via display name |
| CVE-2026-34931 | hoppscotch: Improper loopback redirect_uri validation in device-login flow | |
| CVE-2026-34932 | hoppscotch: Stored XSS via mock server responses on backend origin |
No comments yet