CVE-2026-7178: ChatGPTNextWeb NextChat SSRF Vulnerability

CVE-2026-7178: ChatGPTNextWeb NextChat SSRF Vulnerability

A critical server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7178, has been disclosed in ChatGPTNextWeb NextChat versions up to 2.16.1. The National Vulnerability Database reports this flaw resides in the storeUrl function within the app/api/artifacts/route.ts file, specifically impacting the Artifacts Endpoint component. Manipulating the ID argument allows for remote initiation of SSRF attacks.

This vulnerability carries a CVSSv3.1 score of 7.3 (HIGH severity), indicating a significant risk. Crucially, an exploit for CVE-2026-7178 has been publicly released, meaning attackers can immediately leverage this weakness. The National Vulnerability Database notes that the project maintainers were informed via an issue report but have not yet provided a response or patch.

SSRF vulnerabilities are dangerous because they enable attackers to force the server to make requests to internal or external resources on their behalf. This can lead to unauthorized access to internal systems, data leakage, or even remote code execution in some configurations. The public availability of an exploit drastically escalates the immediate threat, requiring urgent attention from defenders.

What This Means For You

  • If your organization uses ChatGPTNextWeb NextChat, you are exposed. This isn't theoretical; an exploit is public. You need to immediately identify all instances of NextChat in your environment and prepare to patch or mitigate as soon as a fix is available. Block external access to the Artifacts Endpoint if possible, and monitor your network for unusual outbound connections originating from NextChat instances.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-7178: NextChat Artifacts Endpoint SSRF via storeUrl

Sigma YAML — free preview
title: CVE-2026-7178: NextChat Artifacts Endpoint SSRF via storeUrl
id: scw-2026-04-27-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit CVE-2026-7178 by targeting the Artifacts Endpoint's storeUrl function in NextChat. This rule looks for POST requests to '/api/artifacts/route.ts' that contain the 'storeUrl=' parameter, indicating a potential Server-Side Request Forgery (SSRF) attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7178/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/api/artifacts/route.ts'
      cs-uri-query|contains:
          - 'storeUrl='
      cs-method|exact:
          - 'POST'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7178 SSRF ChatGPTNextWeb NextChat up to 2.16.1
CVE-2026-7178 SSRF app/api/artifacts/route.ts
CVE-2026-7178 SSRF function storeUrl
CVE-2026-7178 SSRF component Artifacts Endpoint
CVE-2026-7178 SSRF manipulation of the argument ID
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 28, 2026 at 01:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7199: SQL Injection in Pharmacy Sales and Inventory System

CVE-2026-7199 — A vulnerability was detected in SourceCodester Pharmacy Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file...

vulnerabilityCVEhigh-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-7196 — CodeAstro Online Classroom SQL Injection

CVE-2026-7196 — A security vulnerability has been detected in CodeAstro Online Classroom 1.0. Affected is an unknown function of the file /guestdetails. Such manipulation of...

vulnerabilityCVEmedium-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-41372 — OpenClaw before 2026.4.2 fails to normalize trailing-dot

CVE-2026-41372 — OpenClaw before 2026.4.2 fails to normalize trailing-dot localhost hosts in remote CDP discovery responses, allowing bypass of loopback protections. Attackers can craft hostile...

vulnerabilityCVEmedium-severitycwe-639
/SCW Vulnerability Desk /MEDIUM /5.8 /⚑ 2 IOCs /⚙ 1 Sigma