Home

Description

FastGPT is an AI Agent building platform. From 4.14.0 to 4.14.5, attackers can directly access the plugin system through FastGPT/api/plugin/xxx without authentication, thereby threatening the plugin system. This may cause the plugin system to crash and the loss of plugin installation status, but it will not result in key leakage. For older versions, as there are only operation interfaces for obtaining information, the impact is almost negligible. This vulnerability is fixed in 4.14.5-fix.

PUBLISHED Reserved 2026-02-09 | Published 2026-02-10 | Updated 2026-02-10 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L

Problem types

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

>= 4.14.0, < 4.14.5-fix
affected

References

github.com/...astGPT/security/advisories/GHSA-wcrg-g824-9gfg

github.com/...ommit/0beb52a2f3dc4067aab011cc98122d1352823b0c

github.com/labring/FastGPT/releases/tag/v4.14.5-fix

cve.org (CVE-2026-26003)

nvd.nist.gov (CVE-2026-26003)

Download JSON