Description
A vulnerability was detected in zhayujie chatgpt-on-wechat CowAgent up to 2.0.4. This affects an unknown function of the component Agent Mode Service. Performing a manipulation results in missing authentication. The attack can be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-12
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized remote access via missing authentication
Action: Apply patch
AI Analysis

Impact

The vulnerability resides in the CowAgent component of the ChatGPT on WeChat application. An unknown function within the Agent Mode Service fails to enforce authentication, allowing an attacker to execute that function without any credentials. This omission can grant the attacker unauthorized control over the service, potentially exposing sensitive data, altering service behavior, or enabling further exploitation within the host system.

Affected Systems

Products affected include the ChatGPT on WeChat CowAgent released by the developer zhayujie. All versions up to 2.0.4 are vulnerable, as documented in the advisory and issue reports. Users of these releases should verify their version and seek an updated release that addresses the authentication bypass.

Risk and Exploitability

The CVSS base score of 6.9 indicates moderate to high impact. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet become widely exploited. However, because the flaw can be triggered remotely, an attacker who can reach the Agent Mode Service endpoint could potentially exploit it. The lack of authentication makes the attack path simple, but the exact prerequisites (e.g., specific request format) remain undetailed; the available references indicate prevention is currently limited to applying an update.

Generated by OpenCVE AI on April 12, 2026 at 21:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a version newer than 2.0.4 that implements authentication for the Agent Mode Service
  • If no update is available, disable or remove the Agent Mode Service or restrict network access to it
  • Monitor application logs for suspicious activity related to the Agent Mode Service
  • Apply firewall or segmentation rules to block unintended access until the vulnerability is resolved

Generated by OpenCVE AI on April 12, 2026 at 21:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Zhayujie
Zhayujie chatgpt-on-wechat Cowagent
Vendors & Products Zhayujie
Zhayujie chatgpt-on-wechat Cowagent

Sun, 12 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in zhayujie chatgpt-on-wechat CowAgent up to 2.0.4. This affects an unknown function of the component Agent Mode Service. Performing a manipulation results in missing authentication. The attack can be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title zhayujie chatgpt-on-wechat CowAgent Agent Mode Service missing authentication
Weaknesses CWE-287
CWE-306
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:W/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Zhayujie Chatgpt-on-wechat Cowagent
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-15T15:25:46.572Z

Reserved: 2026-04-12T04:23:09.399Z

Link: CVE-2026-6129

cve-icon Vulnrichment

Updated: 2026-04-15T15:25:41.317Z

cve-icon NVD

Status : Deferred

Published: 2026-04-12T20:16:19.227

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6129

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:59Z

Weaknesses