Skip to content
CVSS 7.3 · HIGH

CVE-2026-7644

A vulnerability has been found in ChatGPTNextWeb NextChat up to 2.16.1. Affected is the function addMcpServer of the file app/mcp/actions.ts. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

View on NVD

Analysis

NextChat (ChatGPTNextWeb) versions up to 2.16.1 are vulnerable to improper authorization in the MCP server management logic. Remote attackers can exploit this to add unauthorized servers, and with public exploits already in the wild, self-hosted instances should be secured behind authentication or updated as soon as a fix is available.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE): CWE-266CWE-285

EPSS

Probability of exploitation (next 30 days): 0.0004 (0.0%)
Percentile: 12.1%
EPSS: 2026-05-06

Technical description

A vulnerability has been found in ChatGPTNextWeb NextChat up to 2.16.1. Affected is the function addMcpServer of the file app/mcp/actions.ts. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Published: 5/2/2026, 3:16:14 PM
Last modified: 5/5/2026, 7:15:06 PM

References

HomeEventsBlogResourcesTeam