CVE-2026-7223 PUBLISHED

BigSweetPotatoStudio HyperChat AI Proxy Middleware aiProxyMiddleware.mts fetch server-side request forgery

Assigner: VulDB
Reserved: 27.04.2026 Published: 28.04.2026 Updated: 28.04.2026

A vulnerability was identified in BigSweetPotatoStudio HyperChat up to 2.0.0-alpha.63. Affected by this issue is the function fetch of the file packages/core/src/http/aiProxyMiddleware.mts of the component AI Proxy Middleware. Such manipulation of the argument baseurl leads to server-side request forgery. The attack can be launched remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor BigSweetPotatoStudio
Product HyperChat
Versions
  • Version 2.0.0-alpha.0 is affected
  • Version 2.0.0-alpha.1 is affected
  • Version 2.0.0-alpha.2 is affected
  • Version 2.0.0-alpha.3 is affected
  • Version 2.0.0-alpha.4 is affected
  • Version 2.0.0-alpha.5 is affected
  • Version 2.0.0-alpha.6 is affected
  • Version 2.0.0-alpha.7 is affected
  • Version 2.0.0-alpha.8 is affected
  • Version 2.0.0-alpha.9 is affected
  • Version 2.0.0-alpha.10 is affected
  • Version 2.0.0-alpha.11 is affected
  • Version 2.0.0-alpha.12 is affected
  • Version 2.0.0-alpha.13 is affected
  • Version 2.0.0-alpha.14 is affected
  • Version 2.0.0-alpha.15 is affected
  • Version 2.0.0-alpha.16 is affected
  • Version 2.0.0-alpha.17 is affected
  • Version 2.0.0-alpha.18 is affected
  • Version 2.0.0-alpha.19 is affected
  • Version 2.0.0-alpha.20 is affected
  • Version 2.0.0-alpha.21 is affected
  • Version 2.0.0-alpha.22 is affected
  • Version 2.0.0-alpha.23 is affected
  • Version 2.0.0-alpha.24 is affected
  • Version 2.0.0-alpha.25 is affected
  • Version 2.0.0-alpha.26 is affected
  • Version 2.0.0-alpha.27 is affected
  • Version 2.0.0-alpha.28 is affected
  • Version 2.0.0-alpha.29 is affected
  • Version 2.0.0-alpha.30 is affected
  • Version 2.0.0-alpha.31 is affected
  • Version 2.0.0-alpha.32 is affected
  • Version 2.0.0-alpha.33 is affected
  • Version 2.0.0-alpha.34 is affected
  • Version 2.0.0-alpha.35 is affected
  • Version 2.0.0-alpha.36 is affected
  • Version 2.0.0-alpha.37 is affected
  • Version 2.0.0-alpha.38 is affected
  • Version 2.0.0-alpha.39 is affected
  • Version 2.0.0-alpha.40 is affected
  • Version 2.0.0-alpha.41 is affected
  • Version 2.0.0-alpha.42 is affected
  • Version 2.0.0-alpha.43 is affected
  • Version 2.0.0-alpha.44 is affected
  • Version 2.0.0-alpha.45 is affected
  • Version 2.0.0-alpha.46 is affected
  • Version 2.0.0-alpha.47 is affected
  • Version 2.0.0-alpha.48 is affected
  • Version 2.0.0-alpha.49 is affected
  • Version 2.0.0-alpha.50 is affected
  • Version 2.0.0-alpha.51 is affected
  • Version 2.0.0-alpha.52 is affected
  • Version 2.0.0-alpha.53 is affected
  • Version 2.0.0-alpha.54 is affected
  • Version 2.0.0-alpha.55 is affected
  • Version 2.0.0-alpha.56 is affected
  • Version 2.0.0-alpha.57 is affected
  • Version 2.0.0-alpha.58 is affected
  • Version 2.0.0-alpha.59 is affected
  • Version 2.0.0-alpha.60 is affected
  • Version 2.0.0-alpha.61 is affected
  • Version 2.0.0-alpha.62 is affected
  • Version 2.0.0-alpha.63 is affected

Credits

  • BruceJin (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Server-Side Request Forgery CWE