CVE-2024-38514

NextChat Server-Side Request Forgery (SSRF)

Basic Information

CVE State
PUBLISHED
Reserved Date
June 18, 2024
Published Date
June 28, 2024
Last Updated
August 02, 2024
Vendor
ChatGPTNextWeb
Product
ChatGPT-Next-Web
Description
NextChat is a cross-platform ChatGPT/Gemini UI. There is a Server-Side Request Forgery (SSRF) vulnerability due to a lack of validation of the `endpoint` GET parameter on the WebDav API endpoint. This SSRF can be used to perform arbitrary HTTPS request from the vulnerable instance (MKCOL, PUT and GET methods supported), or to target NextChat users and make them execute arbitrary JavaScript code in their browser. This vulnerability has been patched in version 2.12.4.
Tags
nuclei_scanner

CVSS Scores

CVSS v3.1

7.4 - HIGH

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS Score

Score
37.17% (Percentile: 96.95%) as of 2025-05-19

SSVC Information

Exploitation
none
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2025-05-15 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-15 00:00:00 UTC

Scanner Integrations