ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)
A critical improper authorization vulnerability, CVE-2026-7644, has been identified in ChatGPTNextWeb NextChat versions up to 2.16.1. The National Vulnerability Database reports that the flaw resides within the addMcpServer function of the app/mcp/actions.ts file, allowing for remote exploitation without requiring user interaction.
This vulnerability carries a CVSS score of 7.3 (HIGH), indicating a significant risk. The exploit details have been publicly disclosed, meaning attackers can readily weaponize it. According to the National Vulnerability Database, the project maintainers were notified but have yet to issue a fix or a public response. This leaves deployments of affected versions exposed to potential compromise.
Attackers leveraging this flaw could gain unauthorized access or manipulate application functions, potentially leading to data compromise or unauthorized actions within the NextChat environment. The lack of a patch and public disclosure means defenders must act proactively to mitigate risks.
What This Means For You
- If your organization uses ChatGPTNextWeb NextChat, immediately verify your deployed version. Any instance running 2.16.1 or earlier is vulnerable to CVE-2026-7644. Given the public disclosure and lack of a patch, assume active exploitation is possible. Isolate or discontinue use of affected instances until a fix is available, or implement robust network-level access controls to restrict external access to the `addMcpServer` function.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7644 - ChatGPTNextWeb NextChat Improper Authorization
title: CVE-2026-7644 - ChatGPTNextWeb NextChat Improper Authorization
id: scw-2026-05-02-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit the improper authorization vulnerability in ChatGPTNextWeb NextChat (CVE-2026-7644) by targeting the '/api/mcp/addMcpServer' endpoint via a POST request. This is the primary indicator of exploitation for this specific vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7644/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/mcp/addMcpServer'
cs-method:
- 'POST'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7644 | Auth Bypass | ChatGPTNextWeb NextChat up to 2.16.1 |
| CVE-2026-7644 | Auth Bypass | Function addMcpServer in app/mcp/actions.ts |
| CVE-2026-7644 | ChatGPTNextWeb NextChat up to 2.16.1 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 02, 2026 at 18:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.