CVE-2026-6662: Open CORS Policy in copilot-api Exposes Token Endpoint
The National Vulnerability Database (NVD) has disclosed CVE-2026-6662, a critical vulnerability impacting ericc-ch copilot-api versions up to 0.7.0. The flaw resides in the CORS (Cross-Origin Resource Sharing) implementation within the Token Endpoint’s src/server.ts file. Attackers can exploit this weakness to establish permissive cross-domain policies, allowing them to interact with untrusted domains remotely. With the exploit already public, this presents an immediate risk to organizations utilizing this component.
What This Means For You
- If your organization uses ericc-ch copilot-api, you must update to a version beyond 0.7.0 immediately. This vulnerability allows remote attackers to bypass domain restrictions, potentially leading to unauthorized access or data exfiltration through the token endpoint. Audit your API endpoints for any unusual cross-domain requests.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-6662: Open CORS Policy in copilot-api Token Endpoint
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6662 | Misconfiguration | ericc-ch copilot-api up to 0.7.0 |
| CVE-2026-6662 | Misconfiguration | Token Endpoint component |
| CVE-2026-6662 | Misconfiguration | src/server.ts::cors function |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 20, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.