Description
FastGPT is an AI Agent building platform. Prior to 4.14.10.4, Broken Access Control vulnerability (IDOR/BOLA) allows any authenticated team to access and execute applications belonging to other teams by supplying a foreign appId. While the API correctly validates the team token, it does not verify that the requested application belongs to the authenticated team. This leads to cross-tenant data exposure and unauthorized execution of private AI workflows. This vulnerability is fixed in 4.14.10.4.
Published: 2026-04-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized execution of private AI workflows across tenants
Action: Patch
AI Analysis

Impact

FastGPT is an AI Agent building platform. Prior to version 4.14.10.4, it suffered from a broken access control flaw (IDOR/BOLA). The API validates the user’s team token but fails to confirm that the requested application ID belongs to that team. This means any authenticated user can supply a foreign appId and execute another team’s private AI workflows, resulting in cross‑tenant data exposure and unauthorized execution. The weakness corresponds to CWE‑284 (Improper Authorization) and CWE‑639 (Authorization Bypass Through User‑Controlled Key).

Affected Systems

The affected product is FastGPT by labring. Versions before 4.14.10.4 are vulnerable. Any environment where users are authenticated and have API access is at risk.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. EPSS is not available, and the vulnerability is not listed in CISA’s KEV catalog. An attacker would need to be authenticated within a team and target the appId parameter; no special privilege beyond regular authentication is required. Because the flaw enables cross‑tenant code execution and data leakage, the potential impact is significant for confidentiality and integrity, although the attack requires user authentication. The risk is therefore moderate to high for organizations that host multiple teams within FastGPT.

Generated by OpenCVE AI on April 10, 2026 at 22:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FastGPT to version 4.14.10.4 or later to fix the broken access control flaw.

Generated by OpenCVE AI on April 10, 2026 at 22:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Fastgpt
Fastgpt fastgpt
CPEs cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:*
Vendors & Products Fastgpt
Fastgpt fastgpt
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Mon, 13 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Labring
Labring fastgpt
Vendors & Products Labring
Labring fastgpt

Fri, 10 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Description FastGPT is an AI Agent building platform. Prior to 4.14.10.4, Broken Access Control vulnerability (IDOR/BOLA) allows any authenticated team to access and execute applications belonging to other teams by supplying a foreign appId. While the API correctly validates the team token, it does not verify that the requested application belongs to the authenticated team. This leads to cross-tenant data exposure and unauthorized execution of private AI workflows. This vulnerability is fixed in 4.14.10.4.
Title Broken Access Control (IDOR) Leading to Cross-Tenant Application Access in FastGPT
Weaknesses CWE-284
CWE-639
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-13T16:14:30.862Z

Reserved: 2026-04-10T17:31:45.786Z

Link: CVE-2026-40252

cve-icon Vulnrichment

Updated: 2026-04-13T16:14:26.664Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T21:16:27.907

Modified: 2026-04-21T18:52:50.580

Link: CVE-2026-40252

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:57:20Z

Weaknesses