We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49131

FastGPT Sandbox Vulnerable to Sandbox Bypass



Description

FastGPT is an open-source project that provides a platform for building, deploying, and operating AI-driven workflows and conversational agents. The Sandbox container (fastgpt-sandbox) is a specialized, isolated environment used by FastGPT to safely execute user-submitted or dynamically generated code in isolation. The sandbox before version 4.9.11 has insufficient isolation and inadequate restrictions on code execution by allowing overly permissive syscalls, which allows attackers to escape the intended sandbox boundaries. Attackers could exploit this to read and overwrite arbitrary files and bypass Python module import restrictions. This is patched in version 4.9.11 by restricting the allowed system calls to a safer subset and additional descriptive error messaging.

Reserved 2025-06-02 | Published 2025-06-09 | Updated 2025-06-09 | Assigner GitHub_M


MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem types

CWE-732: Incorrect Permission Assignment for Critical Resource

Product status

< 4.9.11
affected

References

github.com/...astGPT/security/advisories/GHSA-f3pf-r3g7-g895

github.com/labring/FastGPT/pull/4958

github.com/...ommit/bb810a43a1c70683fab7f5fe993771e930a94426

github.com/labring/FastGPT/pkgs/container/fastgpt-sandbox

github.com/labring/FastGPT/releases/tag/v4.9.11

cve.org (CVE-2025-49131)

nvd.nist.gov (CVE-2025-49131)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49131

Support options

Helpdesk Chat, Email, Knowledgebase