Impact
The vulnerability stems from the agent-sandbox component of FastGPT, where the startup script initializes code-server with authentication disabled and binds the service to all network interfaces. As a result, any user who can reach the exposed port can bypass any authentication mechanism, execute arbitrary code, and take full control of the sandbox environment. The flaw, listed as CWE-306, permits unauthenticated remote code execution.
Affected Systems
Versions of FastGPT from 4.14.10 up to, but excluding, 4.14.13 of the agent-sandbox are affected. Vendors such as labring:FastGPT are impacted by this misconfiguration.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical severity. While an EPSS score is not available, the absence of a KEV listing does not reduce the risk inherent in an unauthenticated RCE. Attackers would need network access to the exposed port; the vulnerability is network-based and does not require prior authentication.
OpenCVE Enrichment