CVE-2023-49785

CRITICAL EXPLOITED NUCLEI

Nextchat < 2.11.2 - SSRF

Title source: rule

Description

NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 and prior are vulnerable to server-side request forgery and cross-site scripting. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.

Exploits (1)

nomisec STUB
by hyunnna · poc
https://github.com/hyunnna/NextChat_SSRF_CVE-2023-49785

Nuclei Templates (1)

ChatGPT-Next-Web - SSRF/XSS
CRITICALVERIFIEDby high
Shodan: title:NextChat,"ChatGPT Next Web"

Scores

CVSS v3 9.1
EPSS 0.9044
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Details

VulnCheck KEV 2024-04-06
CWE
CWE-918 CWE-79
Status published
Products (2)
nextchat/nextchat < 2.11.2
npm/nextchat 0npm
Published Mar 12, 2024
Tracked Since Feb 18, 2026