CVE-2026-7178
Published: 27 April 2026
Summary
CVE-2026-7178 is a high-severity SSRF (CWE-918) vulnerability in Nextchat Nextchat. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the SSRF flaw in the storeUrl function of the Artifacts Endpoint by identifying, patching, and verifying fixes for the manipulable ID argument.
Requires validation of the ID argument to block manipulation that triggers unauthorized server-side requests in the Artifacts Endpoint.
Enforces information flow policies to restrict unauthorized outbound requests initiated by the SSRF-vulnerable storeUrl function.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF vulnerability in public-facing web app (Artifacts Endpoint) directly enables initial access via exploitation of public-facing applications.
NVD Description
A weakness has been identified in ChatGPTNextWeb NextChat up to 2.16.1. This affects the function storeUrl of the file app/api/artifacts/route.ts of the component Artifacts Endpoint. This manipulation of the argument ID causes server-side request forgery. It is possible to initiate…
more
the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Deeper analysisAI
CVE-2026-7178 is a server-side request forgery (SSRF) vulnerability, mapped to CWE-918, affecting ChatGPTNextWeb NextChat versions up to 2.16.1. The flaw exists in the storeUrl function of the file app/api/artifacts/route.ts within the Artifacts Endpoint, where manipulation of the ID argument enables the forgery.
Remote attackers require no privileges (AV:N/AC:L/PR:N/UI:N/S:U) to exploit this issue, as indicated by its CVSS v3.1 base score of 7.3 (C:L/I:L/A:L). Successful exploitation allows limited impacts on confidentiality, integrity, and availability, with a public exploit available that could facilitate attacks.
Advisories note that the project was informed early via GitHub issue #6741 but has not responded, and no patches or specific mitigations are detailed. Relevant references include the exploit gist at https://gist.github.com/YLChen-007/43252d45d75e8bdd2d45136fd6ffe8a5, the project repository at https://github.com/ChatGPTNextWeb/NextChat/, VulDB entries at https://vuldb.com/submit/797646 and https://vuldb.com/vuln/359780, and the issue tracker.
The vulnerability carries notable context as a publicly available exploit targets an open-source web interface for ChatGPT, with no vendor response as of publication on 2026-04-27.
Details
- CWE(s)