CVE-2023-49785

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-49785
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-49785.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-49785
Aliases
Published
2024-03-12T00:15:26Z
Modified
2025-04-10T22:47:54.861603Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 and prior are vulnerable to server-side request forgery and cross-site scripting. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.

References

Affected packages

Git / github.com/chatgptnextweb/nextchat

Affected ranges

Type
GIT
Repo
https://github.com/chatgptnextweb/nextchat
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

app-vundefined

v1.*

v1.0
v1.1
v1.2
v1.3
v1.4
v1.5
v1.6
v1.7
v1.7.1
v1.7.2
v1.8
v1.9
v1.9.1
v1.9.2
v1.9.3
v1.9.4
v1.9.5
v1.9.6
v1.9.7
v1.9.8
v1.9.9

v2.*

v2.0.1
v2.1
v2.10.1
v2.10.2
v2.10.3
v2.11.2
v2.2
v2.3
v2.4
v2.5
v2.6
v2.7
v2.8
v2.8.1
v2.8.2
v2.8.3
v2.8.4
v2.8.5
v2.8.6
v2.8.7
v2.8.8
v2.8.9
v2.9.0
v2.9.1
v2.9.10
v2.9.11
v2.9.12
v2.9.13
v2.9.2
v2.9.3
v2.9.4
v2.9.5
v2.9.6
v2.9.7
v2.9.8
v2.9.9