CVE-2026-7177
A security flaw has been discovered in ChatGPTNextWeb NextChat up to 2.16.1. Affected by this issue is the function proxyHandler of the file app/api/[provider]/[...path]/route.ts. The manipulation results in server-side request forgery. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
View on NVDAnalysis
NextChat (ChatGPTNextWeb) up to version 2.16.1 is vulnerable to a Server-Side Request Forgery (SSRF) in its proxy handler. Attackers can use this to probe internal networks or access sensitive metadata from your hosting provider. A public exploit is available, and users of self-hosted instances should be aware that no official patch has been confirmed by the vendor.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LCWE-918EPSS
Affects
nextchat:nextchatTechnical description
A security flaw has been discovered in ChatGPTNextWeb NextChat up to 2.16.1. Affected by this issue is the function proxyHandler of the file app/api/[provider]/[...path]/route.ts. The manipulation results in server-side request forgery. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.