Remote Code Execution Vulnerability in Zhayujie ChatGPT-on-WeChat CowAgent Software
CVE-2026-6129
Key Information:
- Vendor
Zhayujie
- Vendor
- CVE Published:
- 12 April 2026
Badges
What is CVE-2026-6129?
A significant vulnerability has been identified in the Zhayujie ChatGPT-on-WeChat CowAgent, affecting versions up to 2.0.4. This vulnerability arises from a flaw in the Agent Mode Service, where missing authentication allows unauthorized remote access and potential exploitation. Although the issue was reported to the development team early on, no response has been documented. This presents a serious risk as the exploit is now public and could be utilized by malicious actors to manipulate the system.
Affected Version(s)
chatgpt-on-wechat CowAgent 2.0.0
chatgpt-on-wechat CowAgent 2.0.1
chatgpt-on-wechat CowAgent 2.0.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
