Cyber Posture

CVE-2026-44478

High

Published: 13 May 2026

Published
13 May 2026
Modified
14 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 13.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-44478 is a high-severity Improper Access Control (CWE-284) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 13.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-284 CWE-287

The awareness and training policy mandates training on access control practices, directly reducing the likelihood of improper access control weaknesses being introduced or exploited.

addresses: CWE-284 CWE-287

Training covers access control policies and the consequences of improper access grants or usage by users.

addresses: CWE-284 CWE-287

Security training teaches access control policies and enforcement, reducing improper access control implementations.

addresses: CWE-284 CWE-287

Provides capability to review session content, directly detecting violations of access control.

addresses: CWE-284 CWE-287

System audit review detects violations of access controls by identifying unauthorized access attempts.

addresses: CWE-284 CWE-287

Control assessments verify that access controls are implemented correctly and operating as intended, detecting improper access control before exploitation.

addresses: CWE-284 CWE-287

Requiring formal approval, documented controls, and responsibilities for inter-system exchanges directly enforces proper access control between systems.

addresses: CWE-284 CWE-287

Penetration testing simulates unauthorized access attempts, directly detecting and enabling remediation of improper access control weaknesses.

NVD Description

hoppscotch is an open source API development ecosystem. The fix for CVE-2026-28215 in version 2026.2.0 addresses the unauthenticated POST /v1/onboarding/config endpoint by checking onboardingCompleted and canReRunOnboarding before allowing config overwrites. However, GET /v1/onboarding/config still leaks all infrastructure secrets in plaintext…

more

to unauthenticated users when the ONBOARDING_RECOVERY_TOKEN stored in the database is an empty string. This vulnerability is fixed in 2026.4.0.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

References