The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the /wp-json/guppylite/v2/channel-authorize rest endpoint in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to intercept and view private chat messages between users.
History

Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Amentotechpvtltd
Amentotechpvtltd one To One User Chat By Wpguppy
Wordpress
Wordpress wordpress
Vendors & Products Amentotechpvtltd
Amentotechpvtltd one To One User Chat By Wpguppy
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 06:45:00 +0000

Type Values Removed Values Added
Description The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the /wp-json/guppylite/v2/channel-authorize rest endpoint in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to intercept and view private chat messages between users.
Title One to one user Chat by WPGuppy <= 1.1.4 - Unauthenticated Information Disclosure via Chat Message Interception
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2026-02-14T06:42:25.584Z

Updated: 2026-02-14T06:42:25.584Z

Reserved: 2025-06-27T14:49:03.655Z

Link: CVE-2025-6792

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-14T07:16:07.270

Modified: 2026-02-14T07:16:07.270

Link: CVE-2025-6792

cve-icon Redhat

No data.