Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labring
Labring fastgpt |
|
| Vendors & Products |
Labring
Labring fastgpt |
Fri, 20 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fastgpt-preview-image.yml workflow is vulnerable to arbitrary code execution and secret exfiltration by any external contributor. It uses pull_request_target (which runs with access to repository secrets) but checks out code from the pull request author's fork, then builds and pushes Docker images using attacker-controlled Dockerfiles. This also enables a supply chain attack via the production container registry. A patch was not available at the time of publication. | |
| Title | FastGPT has Arbitrary Code Execution in GitHub Actions via pull_request_target in fastgpt-preview-image.yml | |
| Weaknesses | CWE-494 CWE-829 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T13:48:05.632Z
Reserved: 2026-03-17T19:27:06.344Z
Link: CVE-2026-33075
Updated: 2026-03-20T13:48:02.604Z
Status : Awaiting Analysis
Published: 2026-03-20T09:16:15.877
Modified: 2026-03-20T13:37:50.737
Link: CVE-2026-33075
No data.
OpenCVE Enrichment
Updated: 2026-03-20T10:26:09Z