CVE-2026-40100

FastGPT is an AI Agent building platform. Prior to 4.14.10.3, the /api/core/app/mcpTools/runTool endpoint accepts arbitrary URLs without authentication. The internal IP check in isInternalAddress() only blocks private IPs when CHECK_INTERNAL_IP=true, which is not the default. This allows unauthenticated attackers to perform SSRF against internal network resources. This vulnerability is fixed in 4.14.10.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:*

History

15 Apr 2026, 19:02

Type Values Removed Values Added
First Time Fastgpt
Fastgpt fastgpt
References () https://github.com/labring/FastGPT/security/advisories/GHSA-jrhc-f3j7-f8g4 - () https://github.com/labring/FastGPT/security/advisories/GHSA-jrhc-f3j7-f8g4 - Vendor Advisory
CPE cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:*

10 Apr 2026, 17:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 17:17

Updated : 2026-04-15 19:02


NVD link : CVE-2026-40100

Mitre link : CVE-2026-40100

CVE.ORG link : CVE-2026-40100


JSON object : View

Products Affected

fastgpt

  • fastgpt
CWE
CWE-918

Server-Side Request Forgery (SSRF)