CVE-2026-7644
Deferred Deferred - Pending Action
Improper Authorization in NextChat Application

Publication date: 2026-05-02

Last updated on: 2026-05-05

Assigner: VulDB

Description
A vulnerability has been found in ChatGPTNextWeb NextChat up to 2.16.1. Affected is the function addMcpServer of the file app/mcp/actions.ts. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-02
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
chatgptnextweb nextchat to 2.16.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to severe impacts including full control over the server running the application.

  • Execution of arbitrary OS commands with the privileges of the server process user.
  • Access to all API keys and secrets stored on the server.
  • Manipulation or destruction of the file system.
  • Potential lateral movement within the network.
  • Installation of persistent backdoors or malware such as cryptocurrency miners.
  • Supply chain attacks by compromising the server environment.

Can you explain this vulnerability to me?

This vulnerability exists in the addMcpServer function of the ChatGPTNextWeb NextChat application (up to version 2.16.1). The function is exposed as a Next.js Server Action without any authentication or authorization checks, allowing an attacker to remotely execute arbitrary operating system commands on the server by sending a specially crafted HTTP POST request.

Because the Server Action identifier is included in the client-side JavaScript bundle, it is easily discoverable by attackers. Exploiting this vulnerability requires no authentication, access code, API key, or user interaction.

The root cause is the lack of authentication in the addMcpServer function, which directly spawns child processes using attacker-controlled commands and arguments.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized HTTP POST requests to the application root that invoke the addMcpServer function without authentication or authorization.

Since the Server Action identifier is embedded in the client-side JavaScript bundle, an attacker can discover it and send malicious commands. Detection involves inspecting web server logs for suspicious POST requests targeting this function.

You can use network monitoring tools or commands like curl to simulate such requests and verify if the server executes commands without authentication.

  • Example command to test the vulnerability (replace <server_url>): curl -X POST <server_url>/ -d '{"command":"id"}' -H "Content-Type: application/json"
  • Check server logs for unexpected command execution or unusual process spawning.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves adding authentication and authorization checks to all MCP Server Actions, especially the addMcpServer function.

Restrict access to the vulnerable endpoint to trusted users only and consider disabling or restricting the addMcpServer functionality until a patch is available.

If possible, update or patch the application once the vendor releases a fix.

Monitor your systems for signs of compromise such as unexpected processes, API key theft, or data manipulation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in ChatGPTNextWeb NextChat allows unauthenticated remote code execution, which can lead to full server compromise including access to API keys, secrets, and potentially sensitive data.

Such unauthorized access and potential data breaches could result in non-compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information.

Failure to secure systems against this vulnerability may lead to violations of data protection requirements, unauthorized data disclosure, and could trigger regulatory penalties.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart