Description
A weakness has been identified in zhayujie chatgpt-on-wechat CowAgent 2.0.4. The affected element is an unknown function of the component Administrative HTTP Endpoint. This manipulation causes missing authentication. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-12
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Admin Access
Action: Immediate Patch
AI Analysis

Impact

A weakness has been identified in the administrative HTTP endpoint of zhayujie chatgpt‑on‑wechat CowAgent 2.0.4. The endpoint is exposed without requiring any authentication, allowing an attacker who can reach the endpoint over the network to invoke administrator functions. Because the specific function that is vulnerable is not disclosed, the exact consequences are unclear, but the lack of authentication alone permits unauthorized control over the application.

Affected Systems

The vulnerability affects the CowAgent component of zhayujie chatgpt‑on‑wechat, specifically the 2.0.4 release. No other product versions are currently known to be impacted by this flaw, and the issue is tied to an unknown administrative HTTP function within that version.

Risk and Exploitability

The CVSS base score of 6.9 indicates moderate severity. The exploit relies on remote access to the unprotected administrative endpoint, and a public exploit has been made available, implying that attackers can readily abuse the weakness if the endpoint is exposed. The EPSS score is not provided, and the flaw is not yet listed in the CISA KEV catalog, but the combination of high accessibility, lack of authentication, and confirmed exploitation code suggests that the risk to systems where the endpoint is reachable is significant. Until a vendor patch is released, administrators should treat the exposed endpoint as a high‑credit risk and take mitigation measures immediately.

Generated by OpenCVE AI on April 12, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest released version of zhayujie chatgpt‑on‑wechat CowAgent, if one exists.
  • Disable the administrative HTTP endpoint or restrict its exposure to trusted networks only.
  • Verify that authentication mechanisms are enforced on all administrative interfaces before granting access.
  • Monitor administrative logs for suspicious activity and apply network segmentation to limit reach to the endpoint.

Generated by OpenCVE AI on April 12, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Zhayujie
Zhayujie chatgpt-on-wechat Cowagent
Vendors & Products Zhayujie
Zhayujie chatgpt-on-wechat Cowagent

Sun, 12 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in zhayujie chatgpt-on-wechat CowAgent 2.0.4. The affected element is an unknown function of the component Administrative HTTP Endpoint. This manipulation causes missing authentication. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Title zhayujie chatgpt-on-wechat CowAgent Administrative HTTP Endpoint missing authentication
Weaknesses CWE-287
CWE-306
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:W/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Zhayujie Chatgpt-on-wechat Cowagent
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T12:24:50.364Z

Reserved: 2026-04-11T20:22:46.584Z

Link: CVE-2026-6126

cve-icon Vulnrichment

Updated: 2026-04-13T12:24:15.743Z

cve-icon NVD

Status : Deferred

Published: 2026-04-12T11:16:16.407

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6126

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:05Z

Weaknesses