Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 18 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amentotechpvtltd
Amentotechpvtltd one To One User Chat By Wpguppy Wordpress Wordpress wordpress |
|
| Vendors & Products |
Amentotechpvtltd
Amentotechpvtltd one To One User Chat By Wpguppy Wordpress Wordpress wordpress |
Sat, 14 Feb 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the /wp-json/guppylite/v2/channel-authorize rest endpoint in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to intercept and view private chat messages between users. | |
| Title | One to one user Chat by WPGuppy <= 1.1.4 - Unauthenticated Information Disclosure via Chat Message Interception | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:32:55.375Z
Reserved: 2025-06-27T14:49:03.655Z
Link: CVE-2025-6792
Updated: 2026-02-18T20:15:57.646Z
Status : Deferred
Published: 2026-02-14T07:16:07.270
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-6792
No data.
OpenCVE Enrichment
Updated: 2026-04-22T14:00:18Z