Description
FastGPT is an AI Agent building platform. In 4.14.7 and earlier, FastGPT's Python Sandbox (fastgpt-sandbox) includes guardrails intended to prevent file writes (static detection + seccomp). These guardrails are bypassable by remapping stdout (fd 1) to an arbitrary writable file descriptor using fcntl. After remapping, writing via sys.stdout.write() still satisfies the seccomp rule write(fd==1), enabling arbitrary file creation/overwrite inside the sandbox container despite the intended no file writes restriction.
Published: 2026-03-11
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Creation/Overwrite in Sandbox
Action: Apply Patch
AI Analysis

Impact

FastGPT’s Python sandbox is intended to block file writes through static analysis and a seccomp filter that prohibits writes on file descriptor 1 (stdout). The vulnerability allows an attacker to remap stdout to any writable file descriptor using fcntl, and then perform sys.stdout.write(), which still satisfies the seccomp rule write(fd==1). Consequently, the sandbox can create or overwrite arbitrary files inside its container, violating the guardrail and compromising the integrity or confidentiality of data processed by the sandbox.

Affected Systems

Vendor: labring. Product: FastGPT. Affected versions: FastGPT 4.14.7 and all earlier releases. Any deployment of these versions is vulnerable due to the file‑write guardrail bypass.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate impact, while the EPSS score of less than 1% shows a low probability of exploitation in the wild; it is not listed in the CISA KEV catalog. The attack scenario requires the ability to execute arbitrary Python code within the sandbox. By remapping stdout via fcntl, an attacker can write to any file inside the container, thereby persisting data or tampering with critical files. The vector is effectively local or remote with sufficient code‑execution privileges, making the vulnerability exploitable in environments that accept untrusted Python scripts.

Generated by OpenCVE AI on March 19, 2026 at 18:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest FastGPT release where the sandbox file‑write restriction has been corrected.
  • If immediate upgrade is not possible, remove or restrict user ability to manipulate file descriptors—tighten seccomp filters, disable stdout remapping or enforce least‑privilege execution for sandbox processes.
  • Until a patch is available, avoid processing untrusted input in the sandbox or run the sandbox with minimal privileges required for operation.

Generated by OpenCVE AI on March 19, 2026 at 18:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Fastgpt
Fastgpt fastgpt
CPEs cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:*
Vendors & Products Fastgpt
Fastgpt fastgpt

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Labring
Labring fastgpt
Vendors & Products Labring
Labring fastgpt

Wed, 11 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description FastGPT is an AI Agent building platform. In 4.14.7 and earlier, FastGPT's Python Sandbox (fastgpt-sandbox) includes guardrails intended to prevent file writes (static detection + seccomp). These guardrails are bypassable by remapping stdout (fd 1) to an arbitrary writable file descriptor using fcntl. After remapping, writing via sys.stdout.write() still satisfies the seccomp rule write(fd==1), enabling arbitrary file creation/overwrite inside the sandbox container despite the intended no file writes restriction.
Title FastGPT Python Sandbox Bypass of File-Write Restriction
Weaknesses CWE-184
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T16:18:13.936Z

Reserved: 2026-03-10T22:19:36.545Z

Link: CVE-2026-32128

cve-icon Vulnrichment

Updated: 2026-03-12T15:31:52.975Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T22:16:32.633

Modified: 2026-03-19T17:38:40.920

Link: CVE-2026-32128

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:55Z

Weaknesses