Description
A vulnerability was found in ericc-ch copilot-api up to 0.7.0. The impacted element is the function cors of the file src/server.ts of the component Token Endpoint. Performing a manipulation results in permissive cross-domain policy with untrusted domains. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Published: 2026-04-20
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: Exploitation of permissive CORS allows untrusted domains to access the token endpoint, potentially enabling unauthorized data access and credential leakage.
Action: Apply Patch
AI Analysis

Impact

The vulnerability exists in the cors function of src/server.ts in the Token Endpoint of ericc-ch copilot-api up to 0.7.0. A crafted request can manipulate the CORS configuration, causing the server to allow any origin. This permits cross-origin requests from malicious domains, enabling attackers to retrieve or submit protected data via the token endpoint. The flaw is identified as CWE-346 and CWE-942, highlighting improper validation and insecure direct resource references. The result is potential confidentiality compromise and exploitation of authentication mechanisms.

Affected Systems

Impact product is ericc-ch:copilot-api, version 0.7.0 and earlier. The vulnerability has been identified in the source file src/server.ts. No other product versions mentioned. Therefore any deployment of ericc-ch copilot-api up to 0.7.0 is affected.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity. The EPSS score is not available, so the exploitation probability cannot be quantified. The vulnerability is not listed in CISA KeV. The attack can be performed remotely by sending a request to the token endpoint with a crafted Origin header or by exploiting the permissive CORS configuration. As the exploit is public, an attacker can use this to bypass same-origin policy and access sensitive data.

Generated by OpenCVE AI on April 20, 2026 at 18:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update ericc-ch copilot-api to the latest release where the cors function validates the Origin header against a whitelist of trusted domains.
  • If an update is not immediately available, configure the application to reject requests whose Origin header is not in a manually curated list of trusted domains, replacing the wildcard "*" permission.
  • Deploy network segmentation or reverse-proxy controls to restrict access to the token endpoint only to internal or known clients until a secure patch is applied.

Generated by OpenCVE AI on April 20, 2026 at 18:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in ericc-ch copilot-api up to 0.7.0. The impacted element is the function cors of the file src/server.ts of the component Token Endpoint. Performing a manipulation results in permissive cross-domain policy with untrusted domains. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Title ericc-ch copilot-api Token Endpoint server.ts cors cross-domain policy
Weaknesses CWE-346
CWE-942
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T18:09:27.691Z

Reserved: 2026-04-20T12:01:50.361Z

Link: CVE-2026-6662

cve-icon Vulnrichment

Updated: 2026-04-20T18:09:23.904Z

cve-icon NVD

Status : Received

Published: 2026-04-20T17:16:39.647

Modified: 2026-04-20T17:16:39.647

Link: CVE-2026-6662

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T18:45:14Z

Weaknesses