<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ChatGPTNextWeb — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/chatgptnextweb/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/chatgptnextweb/feed.xml" rel="self" type="application/rss+xml"/><item><title>ChatGPTNextWeb NextChat Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nextchat-ssrf/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nextchat-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability in ChatGPTNextWeb NextChat up to version 2.16.1 allows remote attackers to manipulate the proxyHandler function, potentially leading to unauthorized internal resource access.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7177, affects ChatGPTNextWeb NextChat up to version 2.16.1. The vulnerability resides within the <code>proxyHandler</code> function in the <code>app/api/[provider]/[...path]/route.ts</code> file. Publicly available exploits demonstrate that a remote attacker can manipulate this function to make unauthorized requests to internal resources. The project maintainers were notified, but have not yet responded to the issue, increasing the risk of widespread exploitation. This vulnerability allows attackers to potentially access sensitive information or internal services that are not intended to be exposed to the internet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a NextChat instance running a vulnerable version (&lt;= 2.16.1).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>app/api/[provider]/[...path]/route.ts</code> endpoint.</li>
<li>The crafted request manipulates the <code>proxyHandler</code> function parameters.</li>
<li>The <code>proxyHandler</code> function, without proper validation, forwards the manipulated request to an internal server or resource.</li>
<li>The internal server processes the request as if it originated from the NextChat server itself.</li>
<li>The internal server returns the response to the NextChat server.</li>
<li>The NextChat server forwards the response from the internal server back to the attacker.</li>
<li>The attacker gains access to potentially sensitive information or can interact with internal services due to the SSRF vulnerability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows attackers to potentially access internal resources, including sensitive data or internal services not intended for public access. While the CVSS score is 7.3 (HIGH), the impact is limited to information disclosure and limited modification/availability of resources. The number of affected instances is currently unknown. If successfully exploited, attackers could potentially use the compromised NextChat instance as a proxy to further compromise the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>proxyHandler</code> function within <code>app/api/[provider]/[...path]/route.ts</code> to prevent malicious manipulation (Reference: CVE-2026-7177).</li>
<li>Monitor web server logs for unusual requests targeting the <code>app/api</code> endpoint with potentially malicious parameters (See example Sigma rule below).</li>
<li>Implement network segmentation to restrict access from the NextChat server to only necessary internal resources (General security best practice related to SSRF).</li>
<li>Deploy the Sigma rules provided to detect exploitation attempts against NextChat instances.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-7177</category><category>web-application</category></item><item><title>ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7178)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-nextchat-ssrf/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-nextchat-ssrf/</guid><description>ChatGPTNextWeb NextChat versions up to 2.16.1 are vulnerable to server-side request forgery (SSRF) due to improper input validation in the storeUrl function, allowing remote attackers to potentially access internal resources or conduct other malicious activities.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7178, affects ChatGPTNextWeb NextChat versions up to 2.16.1. The vulnerability resides in the <code>storeUrl</code> function within the <code>app/api/artifacts/route.ts</code> file, specifically related to the Artifacts Endpoint component. An attacker can manipulate the <code>ID</code> argument to force the server to make requests to arbitrary internal or external resources. This issue was reported to the project maintainers but remains unpatched. The availability of a public exploit increases the risk of active exploitation. This vulnerability allows attackers to bypass network access controls, potentially accessing sensitive data or internal services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of ChatGPTNextWeb NextChat running a version up to 2.16.1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/api/artifacts</code> endpoint.</li>
<li>The request includes a manipulated <code>ID</code> parameter within the request body or query string of the HTTP request to <code>storeUrl</code> function.</li>
<li>The <code>storeUrl</code> function, lacking proper input validation, uses the attacker-supplied <code>ID</code> to construct a URL.</li>
<li>The NextChat server initiates an HTTP request to the attacker-controlled URL.</li>
<li>Depending on the crafted URL, the server may access internal resources, external websites, or cloud services.</li>
<li>The server receives the response from the target resource.</li>
<li>The attacker leverages the SSRF vulnerability to read sensitive internal data, interact with internal services, or potentially pivot to other internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7178 allows an attacker to perform unauthorized actions within the network where the NextChat server is deployed. This may include reading internal files, accessing other internal applications or services, or potentially escalating privileges if the targeted internal service has its own vulnerabilities. Given the publicly available exploit, organizations using vulnerable versions of NextChat are at increased risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChatGPTNextWeb NextChat to a version greater than 2.16.1 to remediate CVE-2026-7178.</li>
<li>Deploy the Sigma rule &ldquo;NextChat SSRF Attempt&rdquo; to detect suspicious requests to the <code>/api/artifacts</code> endpoint with potentially malicious <code>ID</code> parameters.</li>
<li>Monitor web server logs for outbound connections originating from the NextChat server to unusual or internal IP addresses and domains.</li>
<li>Implement strict input validation on the <code>ID</code> parameter of the <code>storeUrl</code> function if immediate patching is not possible.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ssrf</category><category>cve</category><category>vulnerability</category><category>web-application</category></item><item><title>ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)</title><link>https://feed.craftedsignal.io/briefs/2024-01-nextchat-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nextchat-auth-bypass/</guid><description>CVE-2026-7644 is an improper authorization vulnerability in the addMcpServer function of ChatGPTNextWeb NextChat version 2.16.1 and earlier, allowing for potential remote exploitation following public disclosure of the exploit.</description><content:encoded><![CDATA[<p>A vulnerability, CVE-2026-7644, affects ChatGPTNextWeb NextChat up to version 2.16.1. The flaw exists within the <code>addMcpServer</code> function located in the <code>app/mcp/actions.ts</code> file. This vulnerability allows for improper authorization, potentially enabling unauthorized actions. The exploit has been publicly disclosed, increasing the risk of exploitation. The vendor was notified, but there has been no response as of the time of this writing. This vulnerability allows for remote exploitation, meaning an attacker does not need local access to the system to exploit it. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized access and potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a ChatGPTNextWeb NextChat instance running version 2.16.1 or earlier.</li>
<li>Attacker sends a crafted request to the <code>addMcpServer</code> function in <code>app/mcp/actions.ts</code>.</li>
<li>The application fails to properly authorize the request due to the vulnerability in <code>addMcpServer</code>.</li>
<li>The attacker bypasses authorization checks.</li>
<li>The attacker successfully adds a malicious MCP server configuration.</li>
<li>The application uses the malicious MCP server configuration, potentially leading to further unauthorized actions.</li>
<li>Attacker gains unauthorized access to sensitive data or functionality.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7644 could lead to unauthorized access to a NextChat instance. An attacker could potentially manipulate MCP server configurations, leading to further compromise of the application and associated data. Since the exploit is publicly available, the risk of exploitation is significantly elevated, potentially affecting all unpatched instances of NextChat version 2.16.1 or earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChatGPTNextWeb NextChat to a version higher than 2.16.1 to patch CVE-2026-7644.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>addMcpServer</code> function in <code>app/mcp/actions.ts</code>.</li>
<li>Deploy the Sigma rule to detect unauthorized calls to the <code>addMcpServer</code> function.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>authorization</category><category>cve-2026-7644</category><category>web-application</category></item></channel></rss>