Skip to content
CVSS 7.3 · HIGH

CVE-2026-7177

A security flaw has been discovered in ChatGPTNextWeb NextChat up to 2.16.1. Affected by this issue is the function proxyHandler of the file app/api/[provider]/[...path]/route.ts. The manipulation results in server-side request forgery. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

View on NVD

Analysis

NextChat (ChatGPTNextWeb) up to version 2.16.1 is vulnerable to a Server-Side Request Forgery (SSRF) in its proxy handler. Attackers can use this to probe internal networks or access sensitive metadata from your hosting provider. A public exploit is available, and users of self-hosted instances should be aware that no official patch has been confirmed by the vendor.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE): CWE-918

EPSS

Probability of exploitation (next 30 days): 0.0007 (0.1%)
Percentile: 20.3%
EPSS: 2026-05-06

Affects

nextchat:nextchat

Technical description

A security flaw has been discovered in ChatGPTNextWeb NextChat up to 2.16.1. Affected by this issue is the function proxyHandler of the file app/api/[provider]/[...path]/route.ts. The manipulation results in server-side request forgery. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Published: 4/27/2026, 10:16:18 PM
Last modified: 4/30/2026, 7:26:15 PM

References

HomeEventsBlogResourcesTeam