Description
FastGPT is an AI Agent building platform. In versions 4.14.11 and prior, FastGPT's isInternalAddress() function in packages/service/common/system/utils.ts is vulnerable to DNS rebinding (TOCTOU — Time-of-Check to Time-of-Use). The function resolves the hostname via dns.resolve4()/dns.resolve6() and checks resolved IPs against private ranges, but the actual HTTP request happens in a separate call with a new DNS resolution, allowing the DNS record to change between validation and fetch. At time of publication, there are no publicly available patches.
Published: 2026-05-08
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

FastGPT versions up to and including 4.14.11 contain a time-of-check to time-of-use (TOCTOU) race condition in the isInternalAddress() function. The function performs a DNS lookup to validate that an address is private, but the HTTP request that follows is resolved again with a fresh DNS lookup. An attacker can alter the DNS record between the validation and the request, causing the server to send traffic to an attacker‑controlled internal IP, effectively enabling server‑side request forgery (SSRF). This flaw is a classic example of CWE‑367 (Time‑of‑Check/Time‑of‑Use). The primary impact is that an unauthenticated external actor can make the FastGPT instance reach internal hosts, potentially exfiltrating data or pivoting to other attacks. The vulnerability is neither a privilege escalation nor an arbitrary code execution bug, but it allows internal network enumeration and service discovery.

Affected Systems

The affected vendor is Labring, product FastGPT. All releases up to and including version 4.14.11 are impacted. No patched releases have been published publicly at the time of disclosure, and the only available mitigation is to restrain access or patch when available.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate severity. EPSS data is not available, so the current exploitation probability is unknown. The issue is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves an external attacker controlling DNS responses that resolve during the second lookup, allowing SSRF attacks over the network. The lack of a publicly released patch means that administrators must apply network‑level mitigations or build in request validation until a vendor update is released.

Generated by OpenCVE AI on May 8, 2026 at 23:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a patch or upgrade to a version newer than 4.14.11 when an official fix is released.
  • Restrict inbound traffic to FastGPT protected endpoints so that only trusted, internal IP ranges can reach them.
  • Use DNS caching or an internal DNS resolver for all FastGPT requests to prevent external DNS rebinding attacks.

Generated by OpenCVE AI on May 8, 2026 at 23:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Labring
Labring fastgpt
Vendors & Products Labring
Labring fastgpt

Fri, 08 May 2026 22:30:00 +0000

Type Values Removed Values Added
Description FastGPT is an AI Agent building platform. In versions 4.14.11 and prior, FastGPT's isInternalAddress() function in packages/service/common/system/utils.ts is vulnerable to DNS rebinding (TOCTOU — Time-of-Check to Time-of-Use). The function resolves the hostname via dns.resolve4()/dns.resolve6() and checks resolved IPs against private ranges, but the actual HTTP request happens in a separate call with a new DNS resolution, allowing the DNS record to change between validation and fetch. At time of publication, there are no publicly available patches.
Title FastGPT: DNS rebinding TOCTOU bypass in isInternalAddress allows SSRF on all protected endpoints
Weaknesses CWE-367
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T22:10:00.875Z

Reserved: 2026-04-26T13:26:14.515Z

Link: CVE-2026-42344

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T23:16:37.177

Modified: 2026-05-08T23:16:37.177

Link: CVE-2026-42344

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T00:00:25Z

Weaknesses