Skip to content

A vulnerability was determined in ericc-ch copilot-api up...

Moderate severity Unreviewed Published Apr 23, 2026 to the GitHub Advisory Database

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

A vulnerability was determined in ericc-ch copilot-api up to 0.7.0. This impacts an unknown function of the file /token of the component Header Handler. Executing a manipulation of the argument Host can lead to reliance on reverse dns resolution. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

References

Published by the National Vulnerability Database Apr 23, 2026
Published to the GitHub Advisory Database Apr 23, 2026

Severity

Moderate

EPSS score

Weaknesses

Reliance on Reverse DNS Resolution for a Security-Critical Action

The product performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address is truly associated with the hostname. Learn more on MITRE.

CVE ID

CVE-2026-6874

GHSA ID

GHSA-3vr4-cvmg-7fx4

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.