Description
The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the /wp-json/guppylite/v2/channel-authorize rest endpoint in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to intercept and view private chat messages between users.
Published: 2026-02-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Update
AI Analysis

Impact

The One to one user Chat by WPGuppy plugin contains a missing capability check on the /wp-json/guppylite/v2/channel-authorize REST endpoint. Because the endpoint accepts requests without verifying the user’s access rights, unauthenticated attackers can make HTTP calls to this endpoint and intercept private chat messages exchanged between site users. The flaw is categorized as CWE-306 (Missing Authorization for Functionality). A successful exploitation exposes confidential conversation data, potentially revealing personal identifiers or sensitive content, but it does not provide arbitrary code execution or direct control of the underlying WordPress system.

Affected Systems

WordPress sites that have installed the One to one user Chat by WPGuppy plugin – any version up to and including 1.1.4 of the plugin. The affected vendor is amentotechpvtltd, and the issue is present in all installed copies of the plugin without an updated version.

Risk and Exploitability

The published CVSS score of 5.3 indicates moderate severity. The EPSS score of less than 1% suggests a low probability of confirmed exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. The flaw can be exploited over the network through the public REST endpoint, which is reachable via any user’s browser or by automated HTTP requests. Because no authentication or capability check is performed, any client with network access to the site can send a request to the endpoint and receive the contents of private chats. This risk is effectively mitigated by applying a patch that restores proper capability checks or by preventing the endpoint from being accessed by unauthenticated users.

Generated by OpenCVE AI on April 22, 2026 at 13:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the One to one user Chat by WPGuppy plugin to the latest version that includes the capability check fix.
  • Restrict access to the /wp-json/guppylite/v2/channel-authorize endpoint by configuring the site to allow requests only from authenticated users, for example through .htaccess rules or a security plugin.
  • Monitor site traffic and REST API logs for unexpected requests to the /wp-json/guppylite/v2 channel‑authorize endpoint to detect potential exploitation attempts.

Generated by OpenCVE AI on April 22, 2026 at 13:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Amentotechpvtltd
Amentotechpvtltd one To One User Chat By Wpguppy
Wordpress
Wordpress wordpress
Vendors & Products Amentotechpvtltd
Amentotechpvtltd one To One User Chat By Wpguppy
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 06:45:00 +0000

Type Values Removed Values Added
Description The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the /wp-json/guppylite/v2/channel-authorize rest endpoint in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to intercept and view private chat messages between users.
Title One to one user Chat by WPGuppy <= 1.1.4 - Unauthenticated Information Disclosure via Chat Message Interception
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Amentotechpvtltd One To One User Chat By Wpguppy
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:32:55.375Z

Reserved: 2025-06-27T14:49:03.655Z

Link: CVE-2025-6792

cve-icon Vulnrichment

Updated: 2026-02-18T20:15:57.646Z

cve-icon NVD

Status : Deferred

Published: 2026-02-14T07:16:07.270

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6792

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:00:18Z

Weaknesses