ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)

ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)

A critical improper authorization vulnerability, CVE-2026-7644, has been identified in ChatGPTNextWeb NextChat versions up to 2.16.1. The National Vulnerability Database reports that the flaw resides within the addMcpServer function of the app/mcp/actions.ts file, allowing for remote exploitation without requiring user interaction.

This vulnerability carries a CVSS score of 7.3 (HIGH), indicating a significant risk. The exploit details have been publicly disclosed, meaning attackers can readily weaponize it. According to the National Vulnerability Database, the project maintainers were notified but have yet to issue a fix or a public response. This leaves deployments of affected versions exposed to potential compromise.

Attackers leveraging this flaw could gain unauthorized access or manipulate application functions, potentially leading to data compromise or unauthorized actions within the NextChat environment. The lack of a patch and public disclosure means defenders must act proactively to mitigate risks.

What This Means For You

  • If your organization uses ChatGPTNextWeb NextChat, immediately verify your deployed version. Any instance running 2.16.1 or earlier is vulnerable to CVE-2026-7644. Given the public disclosure and lack of a patch, assume active exploitation is possible. Isolate or discontinue use of affected instances until a fix is available, or implement robust network-level access controls to restrict external access to the `addMcpServer` function.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-7644 - ChatGPTNextWeb NextChat Improper Authorization

Sigma YAML — free preview
title: CVE-2026-7644 - ChatGPTNextWeb NextChat Improper Authorization
id: scw-2026-05-02-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit the improper authorization vulnerability in ChatGPTNextWeb NextChat (CVE-2026-7644) by targeting the '/api/mcp/addMcpServer' endpoint via a POST request. This is the primary indicator of exploitation for this specific vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7644/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/api/mcp/addMcpServer'
      cs-method:
          - 'POST'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7644 Auth Bypass ChatGPTNextWeb NextChat up to 2.16.1
CVE-2026-7644 Auth Bypass Function addMcpServer in app/mcp/actions.ts
CVE-2026-7644 Improper Authorization ChatGPTNextWeb NextChat up to 2.16.1
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 02, 2026 at 18:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7643 — ChatGPTNextWeb NextChat Vulnerability

CVE-2026-7643 — A flaw has been found in ChatGPTNextWeb NextChat up to 2.16.1. This impacts an unknown function of the file Next.js of the component...

vulnerabilityCVEmedium-severitycwe-346cwe-942
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-7642 — Pskill9 Website-Downloader Command Injection

CVE-2026-7642 — A vulnerability was detected in pskill9 website-downloader up to 0.1.0. This affects the function download_website of the file src/index.ts of the component MCP...

vulnerabilityCVEmedium-severitycommand-injectioncwe-77cwe-78
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-7633 — Totolink N300RH 6.1c.1353_B20190305 Vulnerability

CVE-2026-7633 — A vulnerability was identified in Totolink N300RH 6.1c.1353_B20190305. This impacts the function setUploadSetting of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument FileName...

vulnerabilityCVEmedium-severitycwe-73
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma