CVE-2024-38514
NextChat Server-Side Request Forgery (SSRF)
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- June 18, 2024
- Published Date
- June 28, 2024
- Last Updated
- August 02, 2024
- Vendor
- ChatGPTNextWeb
- Product
- ChatGPT-Next-Web
- Description
- NextChat is a cross-platform ChatGPT/Gemini UI. There is a Server-Side Request Forgery (SSRF) vulnerability due to a lack of validation of the `endpoint` GET parameter on the WebDav API endpoint. This SSRF can be used to perform arbitrary HTTPS request from the vulnerable instance (MKCOL, PUT and GET methods supported), or to target NextChat users and make them execute arbitrary JavaScript code in their browser. This vulnerability has been patched in version 2.12.4.
- Tags
- Score
- 37.17% (Percentile: 96.95%) as of 2025-05-19
- Exploitation
- none
- Automatable
- Yes
- Technical Impact
- total
- Exploited in the Wild
- Yes (added 2025-05-15 00:00:00 UTC) Source
nuclei_scanner
CVSS Scores
CVSS v3.1
7.4 - HIGH
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score
SSVC Information
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-05-15 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38514.yaml | 2025-04-26 00:00:00 UTC |