FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fastgpt-preview-image.yml workflow is vulnerable to arbitrary code execution and secret exfiltration by any external contributor. It uses pull_request_target (which runs with access to repository secrets) but checks out code from the pull request author's fork, then builds and pushes Docker images using attacker-controlled Dockerfiles. This also enables a supply chain attack via the production container registry. A patch was not available at the time of publication.
References
| Link | Resource |
|---|---|
| https://github.com/labring/FastGPT/security/advisories/GHSA-xfx8-w35j-485c | Exploit Mitigation Vendor Advisory |
Configurations
History
23 Mar 2026, 15:42
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CPE | cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:* | |
| First Time |
Fastgpt
Fastgpt fastgpt |
|
| References | () https://github.com/labring/FastGPT/security/advisories/GHSA-xfx8-w35j-485c - Exploit, Mitigation, Vendor Advisory | |
| Summary |
|
20 Mar 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-20 09:16
Updated : 2026-03-23 15:42
NVD link : CVE-2026-33075
Mitre link : CVE-2026-33075
CVE.ORG link : CVE-2026-33075
JSON object : View
Products Affected
fastgpt
- fastgpt
