CVE-2024-38514
HIGH EXPLOITED NUCLEINextChat <2.12.4 - SSRF
Title source: llmDescription
NextChat is a cross-platform ChatGPT/Gemini UI. There is a Server-Side Request Forgery (SSRF) vulnerability due to a lack of validation of the `endpoint` GET parameter on the WebDav API endpoint. This SSRF can be used to perform arbitrary HTTPS request from the vulnerable instance (MKCOL, PUT and GET methods supported), or to target NextChat users and make them execute arbitrary JavaScript code in their browser. This vulnerability has been patched in version 2.12.4.
Nuclei Templates (1)
NextChat - Server-Side Request Forgery
HIGHVERIFIEDby DhiyaneshDk
Shodan:
title:NextChat,"ChatGPT Next Web"
Scores
CVSS v3
7.4
EPSS
0.7048
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
VulnCheck KEV
2025-02-25
CWE
CWE-918
Status
published
Products (1)
ChatGPTNextWeb/ChatGPT-Next-Web
< 2.12.4
Published
Jun 28, 2024
Tracked Since
Feb 18, 2026