CVE-2026-7223
Received Received - Intake
Server-Side Request Forgery in BigSweetPotatoStudio AI Proxy Middleware

Publication date: 2026-04-28

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was identified in BigSweetPotatoStudio HyperChat up to 2.0.0-alpha.63. Affected by this issue is the function fetch of the file packages/core/src/http/aiProxyMiddleware.mts of the component AI Proxy Middleware. Such manipulation of the argument baseurl leads to server-side request forgery. The attack can be launched remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bigsweetpotatostudio hyperchat to 2.0.0-alpha.63 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-7223 is a Server-Side Request Forgery (SSRF) issue that allows an attacker to coerce the server into making arbitrary HTTP requests to internal or external systems. This can lead to high confidentiality impact as sensitive internal endpoints or data could be accessed or leaked.

Such unauthorized access and potential data exposure could negatively affect compliance with data protection regulations like GDPR and HIPAA, which require strict controls over personal and sensitive data confidentiality and integrity.

Specifically, if the vulnerable HyperChat service processes or stores personal or protected health information, the SSRF vulnerability could be exploited to access or exfiltrate such data, violating regulatory requirements for data security and privacy.

Mitigations such as restricting network access, enforcing allowlists, and adding authentication and authorization checks are recommended to reduce the risk and help maintain compliance.


Can you explain this vulnerability to me?

CVE-2026-7223 is a Server-Side Request Forgery (SSRF) vulnerability in the AI Proxy Middleware component of BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63.

The vulnerability occurs because the middleware accepts an attacker-controlled HTTP header called `baseurl`, concatenates it with the request path, and then makes an outbound HTTP request using the fetch() function without validating or restricting the destination URL.

This allows an attacker with network access to the HyperChat HTTP service to make the server send arbitrary HTTP requests to internal or external systems, potentially accessing sensitive resources or services that are not normally accessible.

The attack can be launched remotely by sending specially crafted requests to the proxy middleware route, exploiting the lack of validation on the `baseurl` header.


How can this vulnerability impact me? :

This vulnerability can have several impacts:

  • Confidentiality: High risk as attackers can coerce the server to access internal or attacker-controlled HTTP endpoints, potentially exposing sensitive data.
  • Integrity: Low risk because while attackers control the destination and payload of outbound requests, they do not directly alter the server’s internal state.
  • Availability: Low risk due to possible unwanted outbound network activity that could degrade service performance.
  • Scope: Changed, since the vulnerability allows attackers to interact with external or internal systems beyond the server itself.

Overall, an attacker with network access to the HyperChat service can exploit this vulnerability to make arbitrary HTTP requests from the server, potentially accessing sensitive internal resources or causing network disruptions.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unusual HTTP requests to the HyperChat service, especially those targeting the AI proxy middleware route prefix (e.g., /<password>/ai/...) with a suspicious or attacker-controlled `baseurl` header.

A practical detection method involves setting up a local HTTP listener on a known port (e.g., 127.0.0.1:8765) and then sending crafted requests to the HyperChat service with the `baseurl` header set to this listener's address. If the server makes outbound requests to the listener, it confirms the presence of the SSRF vulnerability.

  • Start a local HTTP listener (e.g., using netcat): `nc -l 127.0.0.1 8765`
  • Send a crafted HTTP request to the HyperChat service (default port 16100, password 123456) with the `baseurl` header set to `http://127.0.0.1:8765` using curl:
  • curl -X POST "http://localhost:16100/123456/ai/somepath" -H "baseurl: http://127.0.0.1:8765" -d '{"test":"data"}'

If the local listener receives a POST request with the original request body, the vulnerability is confirmed.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the HyperChat HTTP service to trusted networks only, avoiding exposure to untrusted or public networks.

Change the default web password to a strong, unique password and avoid relying solely on path secrecy for access control.

Disable or strictly constrain the `baseurl` proxy feature to prevent attacker-controlled URLs from being used in outbound requests.

Implement destination allowlists to restrict outbound requests to approved upstream AI endpoints only.

Block requests to sensitive IP ranges such as loopback, link-local, and RFC1918 addresses after DNS resolution to prevent SSRF exploitation.

Plan to update or patch the software once a fixed version is released that removes the direct use of the attacker-controlled `baseurl` header in the fetch call and adds proper authentication and authorization checks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart