Critical Severity Vulnerability
This vulnerability has been rated as Critical severity. Immediate action is recommended.
CVE-2026-40351
CriticalVulnerability Description
FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password-based login endpoint uses TypeScript type assertion without runtime validation, allowing an unauthenticated attacker to pass a MongoDB query operator object (e.g., {"$ne": ""}) as the password field. This NoSQL injection bypasses the password check, enabling login as any user including the root administrator. This issue has been fixed in version 4.14.9.5.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References & Resources
-
https://github.com/labring/FastGPT/commit/bd966d479fbe414d02679cf79f9eaaab3d100a2dsecurity-advisories@github.com
-
https://github.com/labring/FastGPT/releases/tag/v4.14.9.5security-advisories@github.com
-
https://github.com/labring/FastGPT/security/advisories/GHSA-x8mx-2mr7-h9xgsecurity-advisories@github.com
Severity Details
Weakness Type (CWE)
Improper Neutralization of Special Elements in Data Query Logic
- Description
- The product generates a query intended to access or manipulate data in a data store such as a database, but it does not neutralize or incorrectly neutralizes special elements that can modify the intended logic of the query.
- Typical Severity
- Medium
- Abstraction Level
- Class
Key Information
- Published Date
- April 17, 2026
