CVE-2026-7178: ChatGPTNextWeb NextChat SSRF Vulnerability
A critical server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7178, has been disclosed in ChatGPTNextWeb NextChat versions up to 2.16.1. The National Vulnerability Database reports this flaw resides in the storeUrl function within the app/api/artifacts/route.ts file, specifically impacting the Artifacts Endpoint component. Manipulating the ID argument allows for remote initiation of SSRF attacks.
This vulnerability carries a CVSSv3.1 score of 7.3 (HIGH severity), indicating a significant risk. Crucially, an exploit for CVE-2026-7178 has been publicly released, meaning attackers can immediately leverage this weakness. The National Vulnerability Database notes that the project maintainers were informed via an issue report but have not yet provided a response or patch.
SSRF vulnerabilities are dangerous because they enable attackers to force the server to make requests to internal or external resources on their behalf. This can lead to unauthorized access to internal systems, data leakage, or even remote code execution in some configurations. The public availability of an exploit drastically escalates the immediate threat, requiring urgent attention from defenders.
What This Means For You
- If your organization uses ChatGPTNextWeb NextChat, you are exposed. This isn't theoretical; an exploit is public. You need to immediately identify all instances of NextChat in your environment and prepare to patch or mitigate as soon as a fix is available. Block external access to the Artifacts Endpoint if possible, and monitor your network for unusual outbound connections originating from NextChat instances.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7178: NextChat Artifacts Endpoint SSRF via storeUrl
title: CVE-2026-7178: NextChat Artifacts Endpoint SSRF via storeUrl
id: scw-2026-04-27-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2026-7178 by targeting the Artifacts Endpoint's storeUrl function in NextChat. This rule looks for POST requests to '/api/artifacts/route.ts' that contain the 'storeUrl=' parameter, indicating a potential Server-Side Request Forgery (SSRF) attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7178/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/artifacts/route.ts'
cs-uri-query|contains:
- 'storeUrl='
cs-method|exact:
- 'POST'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7178 | SSRF | ChatGPTNextWeb NextChat up to 2.16.1 |
| CVE-2026-7178 | SSRF | app/api/artifacts/route.ts |
| CVE-2026-7178 | SSRF | function storeUrl |
| CVE-2026-7178 | SSRF | component Artifacts Endpoint |
| CVE-2026-7178 | SSRF | manipulation of the argument ID |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 28, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.