Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-17467 | FastGPT is an open-source project that provides a platform for building, deploying, and operating AI-driven workflows and conversational agents. The Sandbox container (fastgpt-sandbox) is a specialized, isolated environment used by FastGPT to safely execute user-submitted or dynamically generated code in isolation. The sandbox before version 4.9.11 has insufficient isolation and inadequate restrictions on code execution by allowing overly permissive syscalls, which allows attackers to escape the intended sandbox boundaries. Attackers could exploit this to read and overwrite arbitrary files and bypass Python module import restrictions. This is patched in version 4.9.11 by restricting the allowed system calls to a safer subset and additional descriptive error messaging. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 29 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastgpt
Fastgpt fastgpt |
|
| CPEs | cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fastgpt
Fastgpt fastgpt |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 09 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Jun 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FastGPT is an open-source project that provides a platform for building, deploying, and operating AI-driven workflows and conversational agents. The Sandbox container (fastgpt-sandbox) is a specialized, isolated environment used by FastGPT to safely execute user-submitted or dynamically generated code in isolation. The sandbox before version 4.9.11 has insufficient isolation and inadequate restrictions on code execution by allowing overly permissive syscalls, which allows attackers to escape the intended sandbox boundaries. Attackers could exploit this to read and overwrite arbitrary files and bypass Python module import restrictions. This is patched in version 4.9.11 by restricting the allowed system calls to a safer subset and additional descriptive error messaging. | |
| Title | FastGPT Sandbox Vulnerable to Sandbox Bypass | |
| Weaknesses | CWE-732 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-09T14:40:02.668Z
Reserved: 2025-06-02T10:39:41.633Z
Link: CVE-2025-49131
Updated: 2025-06-09T14:30:17.488Z
Status : Analyzed
Published: 2025-06-09T13:15:24.120
Modified: 2025-12-29T19:09:21.850
Link: CVE-2025-49131
No data.
OpenCVE Enrichment
No data.
EUVD