Description
A flaw has been found in ChatGPTNextWeb NextChat up to 2.16.1. This impacts an unknown function of the file Next.js of the component API Endpoint. Executing a manipulation can lead to permissive cross-domain policy with untrusted domains. The attack may be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-02
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in ChatGPTNextWeb’s NextChat component, present in versions up to 2.16.1, lets a remote attacker manipulate the API endpoint to establish an overly permissive cross‑domain policy. The vulnerability allows the component to accept requests from arbitrary, untrusted domains, potentially exposing sensitive application data and internal interactions. The weakness is identified by CWE‑346 and CWE‑942, indicating improper handling of trust for incoming content and possible path traversal via URLs.

Affected Systems

ChatGPTNextWeb’s NextChat component, all releases up to and including v2.16.1, is affected. The flaw lies within an unnamed file of the Next.js API endpoint. No other vendors or products are referenced.

Risk and Exploitability

The vulnerability carries a CVSS score of 5.3, indicating a moderate severity level. EPSS information is not available, and the issue is not listed in CISA’s KEV catalog. However, a published exploit exists and can be launched remotely, so the risk of active exploitation is real. Attackers can craft requests that bypass origin restrictions through the compromised endpoint, potentially accessing internal resources.

Generated by OpenCVE AI on May 2, 2026 at 16:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NextChat to the newest available release once the vendor issues a fix that removes the permissive CORS setting.
  • Configure your web or API server to enforce a strict CORS policy that only permits known trusted origins and rejects all others; consider disabling any dynamic origin handling in the application code.
  • Continuously monitor API request origins for anomalies and block or alert on requests originating from untrusted domains.

Generated by OpenCVE AI on May 2, 2026 at 16:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Chatgptnextweb
Chatgptnextweb nextchat
Vendors & Products Chatgptnextweb
Chatgptnextweb nextchat

Sat, 02 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in ChatGPTNextWeb NextChat up to 2.16.1. This impacts an unknown function of the file Next.js of the component API Endpoint. Executing a manipulation can lead to permissive cross-domain policy with untrusted domains. The attack may be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title ChatGPTNextWeb NextChat API Endpoint Next.js cross-domain policy
Weaknesses CWE-346
CWE-942
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Chatgptnextweb Nextchat
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-02T14:45:12.877Z

Reserved: 2026-05-01T16:33:59.113Z

Link: CVE-2026-7643

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T15:16:14.203

Modified: 2026-05-02T15:16:14.203

Link: CVE-2026-7643

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T16:30:46Z

Weaknesses