No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chatgptnextweb
Chatgptnextweb nextchat |
|
| Vendors & Products |
Chatgptnextweb
Chatgptnextweb nextchat |
Mon, 27 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in ChatGPTNextWeb NextChat up to 2.16.1. This affects the function storeUrl of the file app/api/artifacts/route.ts of the component Artifacts Endpoint. This manipulation of the argument ID causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | ChatGPTNextWeb NextChat Artifacts Endpoint route.ts storeUrl server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-27T22:00:20.342Z
Reserved: 2026-04-27T08:16:05.917Z
Link: CVE-2026-7178
No data.
Status : Received
Published: 2026-04-27T22:16:19.050
Modified: 2026-04-27T22:16:19.050
Link: CVE-2026-7178
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:16:50Z