Description
FastGPT is an AI Agent building platform. In versions 4.14.13 and prior, the code-sandbox component suffers from insufficient resource isolation and uncontrolled resource consumption. The service relies solely on an application-level soft limit (a 500ms polling interval) for memory management and lacks strict OS-level constraints such as cgroups or kernel-level namespaces. This architectural weakness allows attackers to easily bypass memory checks via time-window attacks, or exhaust the entire JavaScript worker pool via concurrent CPU-intensive requests, resulting in a complete Denial of Service (DoS) for legitimate users. At time of publication, there are no publicly available patches.
Published: 2026-05-08
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

FastGPT’s code‑sandbox lacks stringent OS‑level isolation and relies solely on an application‑level 500ms polling interval to constrain memory usage. Attackers can exploit this architectural weakness by timing attacks that bypass the memory checks or by flooding the system with concurrent CPU‑intensive requests, thereby exhausting the JavaScript worker pool. The immediate consequence is a complete denial of service for legitimate users.

Affected Systems

The vulnerability affects the labring FastGPT platform in all releases 4.14.13 and earlier. Users running these versions on any operating system where the sandbox is active are exposed to the issue.

Risk and Exploitability

With a CVSS score of 6.3 the risk is moderate. No EPSS data is available, and the vulnerability is not listed in CISA’s KEV catalog, indicating that it has not yet been widely exploited in the wild. However, the lack of any OS‑level resource limits means that an attacker can readily launch the described attacks without needing elevated credentials, rendering the exploit straightforward and scalable. The moderate severity combined with the potential for full service disruption underscores the need for timely mitigations.

Generated by OpenCVE AI on May 8, 2026 at 23:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or security advisories for updates and apply patches when available.
  • Deploy OS‑level resource limits such as cgroups or container isolation to constrain each JavaScript worker’s memory and CPU usage.
  • Reduce the polling interval or implement hard timeouts to stop attackers from bypassing memory checks through time‑window attacks.
  • Set up monitoring and alerts for abnormal concurrency or CPU spikes and implement rate‑limiting or temporary blocking of suspicious requests.

Generated by OpenCVE AI on May 8, 2026 at 23:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Labring
Labring fastgpt
Vendors & Products Labring
Labring fastgpt

Fri, 08 May 2026 22:30:00 +0000

Type Values Removed Values Added
Description FastGPT is an AI Agent building platform. In versions 4.14.13 and prior, the code-sandbox component suffers from insufficient resource isolation and uncontrolled resource consumption. The service relies solely on an application-level soft limit (a 500ms polling interval) for memory management and lacks strict OS-level constraints such as cgroups or kernel-level namespaces. This architectural weakness allows attackers to easily bypass memory checks via time-window attacks, or exhaust the entire JavaScript worker pool via concurrent CPU-intensive requests, resulting in a complete Denial of Service (DoS) for legitimate users. At time of publication, there are no publicly available patches.
Title FastGPT: Uncontrolled Resource Consumption leading to Sandbox Exhaustion
Weaknesses CWE-400
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T22:09:03.156Z

Reserved: 2026-04-26T13:26:14.514Z

Link: CVE-2026-42343

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T23:16:37.050

Modified: 2026-05-08T23:16:37.050

Link: CVE-2026-42343

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T01:30:15Z

Weaknesses