ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7177) Exposed
A high-severity Server-Side Request Forgery (SSRF) vulnerability, identified as CVE-2026-7177, has been discovered in ChatGPTNextWeb NextChat versions up to 2.16.1. According to the National Vulnerability Database, this flaw resides within the proxyHandler function in the app/api/[provider]/[...path]/route.ts file. The manipulation allows for remote execution of SSRF attacks, posing a significant risk.
This vulnerability carries a CVSS score of 7.3 (HIGH) and is classified under CWE-918. The National Vulnerability Database indicates that an exploit for this issue has already been publicly released, meaning attackers can readily leverage it. The project maintainers were reportedly informed via an issue report but have not yet responded, leaving affected instances exposed.
SSRF vulnerabilities enable attackers to coerce the server-side application into making requests to an arbitrary domain of their choosing. This can lead to internal network enumeration, access to sensitive internal services, and potential data exfiltration. The public availability of an exploit significantly increases the urgency for defenders to address this threat.
What This Means For You
- If your organization utilizes ChatGPTNextWeb NextChat, you are directly exposed to CVE-2026-7177. This is not a theoretical threat; a public exploit exists. Immediately verify your NextChat version and prepare for an urgent patch or mitigation. Assume attackers are actively scanning for vulnerable instances.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7177 - ChatGPTNextWeb NextChat SSRF via proxyHandler
title: CVE-2026-7177 - ChatGPTNextWeb NextChat SSRF via proxyHandler
id: scw-2026-04-27-ai-1
status: experimental
level: high
description: |
Detects potential exploitation of CVE-2026-7177 in ChatGPTNextWeb NextChat. This rule looks for requests targeting the '/api/proxy/' endpoint with a 'url=' parameter in the query string, indicative of the SSRF vulnerability in the proxyHandler function. A 200 status code suggests a successful, albeit potentially malicious, response.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7177/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
uri|contains:
- '/api/proxy/'
cs-uri-query|contains:
- 'url='
cs-method:
- 'GET'
sc-status:
- '200'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7177 | SSRF | ChatGPTNextWeb NextChat up to 2.16.1 |
| CVE-2026-7177 | SSRF | Vulnerable function: proxyHandler in app/api/[provider]/[...path]/route.ts |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 28, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.