<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>NextChat (&lt;= 2.16.1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/nextchat--2.16.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/nextchat--2.16.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)</title><link>https://feed.craftedsignal.io/briefs/2024-01-nextchat-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nextchat-auth-bypass/</guid><description>CVE-2026-7644 is an improper authorization vulnerability in the addMcpServer function of ChatGPTNextWeb NextChat version 2.16.1 and earlier, allowing for potential remote exploitation following public disclosure of the exploit.</description><content:encoded><![CDATA[<p>A vulnerability, CVE-2026-7644, affects ChatGPTNextWeb NextChat up to version 2.16.1. The flaw exists within the <code>addMcpServer</code> function located in the <code>app/mcp/actions.ts</code> file. This vulnerability allows for improper authorization, potentially enabling unauthorized actions. The exploit has been publicly disclosed, increasing the risk of exploitation. The vendor was notified, but there has been no response as of the time of this writing. This vulnerability allows for remote exploitation, meaning an attacker does not need local access to the system to exploit it. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized access and potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a ChatGPTNextWeb NextChat instance running version 2.16.1 or earlier.</li>
<li>Attacker sends a crafted request to the <code>addMcpServer</code> function in <code>app/mcp/actions.ts</code>.</li>
<li>The application fails to properly authorize the request due to the vulnerability in <code>addMcpServer</code>.</li>
<li>The attacker bypasses authorization checks.</li>
<li>The attacker successfully adds a malicious MCP server configuration.</li>
<li>The application uses the malicious MCP server configuration, potentially leading to further unauthorized actions.</li>
<li>Attacker gains unauthorized access to sensitive data or functionality.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7644 could lead to unauthorized access to a NextChat instance. An attacker could potentially manipulate MCP server configurations, leading to further compromise of the application and associated data. Since the exploit is publicly available, the risk of exploitation is significantly elevated, potentially affecting all unpatched instances of NextChat version 2.16.1 or earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChatGPTNextWeb NextChat to a version higher than 2.16.1 to patch CVE-2026-7644.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>addMcpServer</code> function in <code>app/mcp/actions.ts</code>.</li>
<li>Deploy the Sigma rule to detect unauthorized calls to the <code>addMcpServer</code> function.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>authorization</category><category>cve-2026-7644</category><category>web-application</category></item></channel></rss>