Impact
The vulnerability is a server‑side request forgery flaw in the storeUrl function of the Artifacts Endpoint route, where a crafted ID parameter can cause the server to perform outgoing HTTP requests to arbitrary URLs. This allows an attacker to retrieve internal resources, exfiltrate sensitive data, or interact with external services on behalf of the server. The weakness is CWE-918, which indicates misuse of untrusted user input in network requests. The impact includes potential compromise of confidentiality, integrity, and availability of the underlying infrastructure as the attacker can force the application to contact any network target.
Affected Systems
ChatGPTNextWeb NextChat, current releases up to version 2.16.1. The issue is limited to the artifcets API endpoint and affects all deployments that include the default storeUrl function without additional safeguards.
Risk and Exploitability
The CVSS score of 6.9 classifies the vulnerability as Moderate, but the public availability of an exploit and the lack of a verified patch increase the practical risk for actively running systems. The EPSS score is not available, and the vulnerability is not listed in CISA KEV, yet the attack can be initiated remotely with the supplied payload. Administrators should treat this as a high‑priority issue until a corrective release is issued.
OpenCVE Enrichment