CVE-2026-7178
🟡 Monitoruj
Wykorzystanie podatności w ChatGPTNextWeb umożliwia zdalne ataki typu server-side request forgery.
CVSS
7.3
EPSS
0.1%
Exploit
poc
Vendor
nextchat
Opis źródłowy (NVD)
A weakness has been identified in ChatGPTNextWeb NextChat up to 2.16.1. This affects the function storeUrl of the file app/api/artifacts/route.ts of the component Artifacts Endpoint. This manipulation of the argument ID causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
exploit ssrf
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-27 22:16:19 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-30 19:26:52 UTC |
Referencje
- https://gist.github.com/YLChen-007/43252d45d75e8bdd2d45136fd6ffe8a5 (cna@vuldb.com) [Exploit, Third Party Advisory]
- https://github.com/ChatGPTNextWeb/NextChat/ (cna@vuldb.com) [Product]
- https://github.com/ChatGPTNextWeb/NextChat/issues/6741 (cna@vuldb.com) [Issue Tracking]
- https://vuldb.com/submit/797646 (cna@vuldb.com) [Exploit, Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359780 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359780/cti (cna@vuldb.com) [Permissions Required]