FastGPT is an AI Agent building platform. From 4.14.0 to 4.14.5, attackers can directly access the plugin system through FastGPT/api/plugin/xxx without authentication, thereby threatening the plugin system. This may cause the plugin system to crash and the loss of plugin installation status, but it will not result in key leakage. For older versions, as there are only operation interfaces for obtaining information, the impact is almost negligible. This vulnerability is fixed in 4.14.5-fix.
References
Configurations
Configuration 1 (hide)
|
History
23 Feb 2026, 18:06
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| First Time |
Fastgpt
Fastgpt fastgpt |
|
| CPE | cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:* cpe:2.3:a:fastgpt:fastgpt:4.14.5:-:*:*:*:*:*:* |
|
| References | () https://github.com/labring/FastGPT/commit/0beb52a2f3dc4067aab011cc98122d1352823b0c - Patch | |
| References | () https://github.com/labring/FastGPT/releases/tag/v4.14.5-fix - Release Notes | |
| References | () https://github.com/labring/FastGPT/security/advisories/GHSA-wcrg-g824-9gfg - Vendor Advisory | |
| Summary |
|
10 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-10 18:16
Updated : 2026-02-23 18:06
NVD link : CVE-2026-26003
Mitre link : CVE-2026-26003
CVE.ORG link : CVE-2026-26003
JSON object : View
Products Affected
fastgpt
- fastgpt
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
