Description
Insertion of Sensitive Information Into Sent Data vulnerability in WP Messiah WP AI CoPilot ai-co-pilot-for-wp allows Retrieve Embedded Sensitive Data.This issue affects WP AI CoPilot: from n/a through <= 1.2.7.
Published: 2025-12-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WP AI CoPilot plugin for WordPress contains an insertion of sensitive information into data that is sent out, allowing an attacker to retrieve embedded sensitive data. This flaw is categorized as CWE‑201: Information Exposure Through an Insecure Function. The exposed data can include credentials or other confidential information that the plugin inadvertently transmits, leading to potential loss of confidentiality for site administrators and visitors.

Affected Systems

WP Messiah’s WP AI CoPilot plugin, any release from the earliest available version up to and including 1.2.7, is vulnerable. This includes all installations of the plugin that have not been updated beyond version 1.2.7.

Risk and Exploitability

The CVSS score of 4.3 indicates a low‑to‑moderate severity. The EPSS score is below 1 %, suggesting that known exploitation is unlikely at the time of this analysis. The vulnerability is not listed in the CISA KEV catalog. Because the description does not specify an attack vector, it is inferred that exploitation may require either authenticated access or could be remote if the plugin’s endpoints are exposed externally. The risk to sensitive data exposure is therefore present, but the likelihood of exploitation is low.

Generated by OpenCVE AI on April 29, 2026 at 12:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP AI CoPilot to the most recent stable release, which removes the information exposure flaw.
  • Delete or deactivate any copies of the plugin that are older than 1.2.7 to eliminate the vulnerable code path.
  • Review the plugin’s configuration or any custom code that links the plugin to external services, ensuring that no sensitive data is inadvertently sent in requests; if uncertain, disable such integrations until the plugin is fully audited.

Generated by OpenCVE AI on April 29, 2026 at 12:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in WP Messiah WP AI CoPilot ai-co-pilot-for-wp allows Retrieve Embedded Sensitive Data.This issue affects WP AI CoPilot: from n/a through <= 1.2.7.
Title WordPress WP AI CoPilot plugin <= 1.2.7 - Sensitive Data Exposure vulnerability
Weaknesses CWE-201
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:00:41.823Z

Reserved: 2025-10-24T14:25:19.441Z

Link: CVE-2025-62994

cve-icon Vulnrichment

Updated: 2025-12-10T21:14:07.147Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:04.760

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62994

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T12:30:10Z

Weaknesses