Description
FastGPT is an AI Agent building platform. In versions 4.14.11 and prior, FastGPT's isInternalAddress() function in packages/service/common/system/utils.ts blocks cloud metadata endpoints using a fullUrl.startsWith() check against a hardcoded list. This check can be bypassed using at least 7 different URL encoding techniques, all of which resolve to the same cloud metadata service but do not match the blocklist patterns. Additionally, the broader private IP check (isInternalIPv4/isInternalIPv6) is disabled by default because CHECK_INTERNAL_IP defaults to false (not 'true'), so these bypasses reach the metadata endpoint without any further validation. At time of publication, there are no publicly available patches.
Published: 2026-05-08
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

FastGPT, an AI agent building platform, contains a server‑side request forgery flaw in versions 4.14.11 and earlier, allowing attackers to reach protected cloud metadata endpoints. The flaw resides in the isInternalAddress() routine, which filters URLs with a simple fullUrl.startsWith() test against a hard‑coded list; this check can be bypassed with at least seven different URL‑encoding techniques that resolve to the metadata service yet do not match the blocklist. Additionally, the private‑IP validation routine is disabled by default because CHECK_INTERNAL_IP defaults to false, permitting the bypassed requests to reach the metadata endpoint without further verification. Adversaries who can inject a URL into FastGPT that is subsequently fetched internally can read sensitive data such as instance identity, credentials, and other privileged information, thereby compromising confidentiality and integrity.

Affected Systems

The vulnerability impacts the labring FastGPT platform, specifically all releases 4.14.11 and earlier. No other products or vendors are known to be affected.

Risk and Exploitability

The CVSS score of 7.7 indicates a high severity level. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through an application endpoint that accepts user‑supplied URLs or data that FastGPT uses to issue internal HTTP requests. Successful exploitation would grant an attacker read access to the cloud metadata endpoint, exposing sensitive instance, network, and authentication information. As the bypass requires only the presence of the internal fetch mechanism and the default configuration that leaves internal IP checking disabled, the exploitation likelihood is high for publicly exposed FastGPT deployments that have not applied a patch or mitigated the SSRF check.

Generated by OpenCVE AI on May 8, 2026 at 23:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Configure FastGPT to enable internal IP validation by setting CHECK_INTERNAL_IP to true or disabling the option that leaves it off.
  • Restrict outbound connections to the cloud metadata IP ranges (e.g., 169.254.169.254 for AWS) using firewall rules or security groups to prevent the application from reaching the service.
  • Apply any vendor‑issued fix for FastGPT version 4.14.12 or later once it is released, which resolves the SSRF bypass.
  • Deploy application‑level WAF or request validation to block URLs that target cloud metadata services before they reach the internal request logic.
  • Monitor application logs for unusual outbound request patterns and elevate alerts if access to the metadata endpoint is detected.

Generated by OpenCVE AI on May 8, 2026 at 23:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Labring
Labring fastgpt
Vendors & Products Labring
Labring fastgpt

Fri, 08 May 2026 22:30:00 +0000

Type Values Removed Values Added
Description FastGPT is an AI Agent building platform. In versions 4.14.11 and prior, FastGPT's isInternalAddress() function in packages/service/common/system/utils.ts blocks cloud metadata endpoints using a fullUrl.startsWith() check against a hardcoded list. This check can be bypassed using at least 7 different URL encoding techniques, all of which resolve to the same cloud metadata service but do not match the blocklist patterns. Additionally, the broader private IP check (isInternalIPv4/isInternalIPv6) is disabled by default because CHECK_INTERNAL_IP defaults to false (not 'true'), so these bypasses reach the metadata endpoint without any further validation. At time of publication, there are no publicly available patches.
Title FastGPT: Cloud metadata endpoint SSRF protection bypass via port specification, IPv6 mapping, hex/decimal IP encoding, and trailing dot
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T22:11:09.630Z

Reserved: 2026-04-26T13:26:14.515Z

Link: CVE-2026-42345

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T23:16:37.320

Modified: 2026-05-08T23:16:37.320

Link: CVE-2026-42345

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T00:00:25Z

Weaknesses