Cyber Posture

CVE-2026-7178

HighPublic PoC

Published: 27 April 2026

Published
27 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0007 20.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7178 is a high-severity SSRF (CWE-918) vulnerability in Nextchat Nextchat. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventrecover

Directly remediates the SSRF flaw in the storeUrl function of the Artifacts Endpoint by identifying, patching, and verifying fixes for the manipulable ID argument.

prevent

Requires validation of the ID argument to block manipulation that triggers unauthorized server-side requests in the Artifacts Endpoint.

prevent

Enforces information flow policies to restrict unauthorized outbound requests initiated by the SSRF-vulnerable storeUrl function.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF vulnerability in public-facing web app (Artifacts Endpoint) directly enables initial access via exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A weakness has been identified in ChatGPTNextWeb NextChat up to 2.16.1. This affects the function storeUrl of the file app/api/artifacts/route.ts of the component Artifacts Endpoint. This manipulation of the argument ID causes server-side request forgery. It is possible to initiate…

more

the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Deeper analysisAI

CVE-2026-7178 is a server-side request forgery (SSRF) vulnerability, mapped to CWE-918, affecting ChatGPTNextWeb NextChat versions up to 2.16.1. The flaw exists in the storeUrl function of the file app/api/artifacts/route.ts within the Artifacts Endpoint, where manipulation of the ID argument enables the forgery.

Remote attackers require no privileges (AV:N/AC:L/PR:N/UI:N/S:U) to exploit this issue, as indicated by its CVSS v3.1 base score of 7.3 (C:L/I:L/A:L). Successful exploitation allows limited impacts on confidentiality, integrity, and availability, with a public exploit available that could facilitate attacks.

Advisories note that the project was informed early via GitHub issue #6741 but has not responded, and no patches or specific mitigations are detailed. Relevant references include the exploit gist at https://gist.github.com/YLChen-007/43252d45d75e8bdd2d45136fd6ffe8a5, the project repository at https://github.com/ChatGPTNextWeb/NextChat/, VulDB entries at https://vuldb.com/submit/797646 and https://vuldb.com/vuln/359780, and the issue tracker.

The vulnerability carries notable context as a publicly available exploit targets an open-source web interface for ChatGPT, with no vendor response as of publication on 2026-04-27.

Details

CWE(s)

Affected Products

nextchat
nextchat
2.16.0, 2.16.1

CVEs Like This One

CVE-2026-7177Same product: Nextchat Nextchat
CVE-2026-7025Shared CWE-918
CVE-2025-21385Shared CWE-918
CVE-2025-52362Shared CWE-918
CVE-2026-31317Shared CWE-918
CVE-2026-5016Shared CWE-918
CVE-2026-26338Shared CWE-918
CVE-2025-58045Shared CWE-918
CVE-2025-68030Shared CWE-918
CVE-2025-27651Shared CWE-918

References