CVE-2023-49785

Public Exploit
NextChat vulnerable to Server-Side Request Forgery and Cross-site Scripting

Description

NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 and prior are vulnerable to server-side request forgery and cross-site scripting. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.

Category

9.1
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 93.25% Top 5%
Affected: ChatGPTNextWeb NextChat
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-49785?
CVE-2023-49785 has been scored as a critical severity vulnerability.
How to fix CVE-2023-49785?
To fix CVE-2023-49785, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-49785 being actively exploited in the wild?
It is possible that CVE-2023-49785 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~93% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-49785?
CVE-2023-49785 affects ChatGPTNextWeb NextChat.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.