Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 30 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nextchat
Nextchat nextchat |
|
| CPEs | cpe:2.3:a:nextchat:nextchat:2.16.0:*:*:*:*:*:*:* cpe:2.3:a:nextchat:nextchat:2.16.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Nextchat
Nextchat nextchat |
Tue, 28 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chatgptnextweb
Chatgptnextweb nextchat |
|
| Vendors & Products |
Chatgptnextweb
Chatgptnextweb nextchat |
Mon, 27 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in ChatGPTNextWeb NextChat up to 2.16.1. This affects the function storeUrl of the file app/api/artifacts/route.ts of the component Artifacts Endpoint. This manipulation of the argument ID causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | ChatGPTNextWeb NextChat Artifacts Endpoint route.ts storeUrl server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-28T14:01:44.043Z
Reserved: 2026-04-27T08:16:05.917Z
Link: CVE-2026-7178
Updated: 2026-04-28T14:01:39.270Z
Status : Analyzed
Published: 2026-04-27T22:16:19.050
Modified: 2026-04-30T19:26:52.517
Link: CVE-2026-7178
No data.
OpenCVE Enrichment
Updated: 2026-04-28T19:45:07Z