CVE-2026-7178
Received Received - Intake
Server-Side Request Forgery in ChatGPTNextWeb Artifacts Endpoint

Publication date: 2026-04-27

Last updated on: 2026-04-30

Assigner: VulDB

Description
A weakness has been identified in ChatGPTNextWeb NextChat up to 2.16.1. This affects the function storeUrl of the file app/api/artifacts/route.ts of the component Artifacts Endpoint. This manipulation of the argument ID causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-27
Last Modified
2026-04-30
Generated
2026-05-07
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
nextchat nextchat 2.16.0
nextchat nextchat 2.16.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a weakness in the ChatGPTNextWeb NextChat application, specifically up to version 2.16.1. It affects the function storeUrl located in the file app/api/artifacts/route.ts within the Artifacts Endpoint component. The issue arises from manipulation of the argument ID, which leads to server-side request forgery (SSRF). This means an attacker can remotely exploit this flaw to make the server perform unauthorized requests.


How can this vulnerability impact me? :

The vulnerability allows an attacker to remotely initiate server-side request forgery, which can lead to unauthorized internal or external requests made by the server. This can result in exposure of sensitive information, unauthorized access to internal systems, or further exploitation of the network. Since the exploit is publicly available, the risk of attacks is increased.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart