DNS Rebinding Vulnerability in Ericc-ch Copilot-API up to Version 0.7.0
CVE-2026-6874
Key Information:
- Vendor
Ericc-ch
- Status
- Vendor
- CVE Published:
- 22 April 2026
Badges
What is CVE-2026-6874?
A vulnerability exists in the Ericc-ch Copilot-API up to version 0.7.0, which affects the Header Handler component in the /token file. This issue allows an attacker to manipulate the Host argument, which may result in unintended reliance on reverse DNS resolution. Such an exploit can be executed remotely, posing a significant risk to the application's security. The exploit has been publicly disclosed, and the vendor was alerted to the issue but did not provide a response.
Affected Version(s)
copilot-api 0.1
copilot-api 0.2
copilot-api 0.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
