High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2026-40352
HighVulnerability Description
FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the "old password" verification by injecting MongoDB query operators. This allows an attacker who has gained a low-privileged session to change the password of their account (or others if combined with ID manipulation) without knowing the current one, leading to full account takeover and persistence. This issue has been fixed in version 4.14.9.5.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References & Resources
-
https://github.com/labring/FastGPT/commit/bd966d479fbe414d02679cf79f9eaaab3d100a2dsecurity-advisories@github.com
-
https://github.com/labring/FastGPT/releases/tag/v4.14.9.5security-advisories@github.com
-
https://github.com/labring/FastGPT/security/advisories/GHSA-422w-vrfj-72g6security-advisories@github.com
Severity Details
Weakness Type (CWE)
Improper Neutralization of Special Elements in Data Query Logic
- Description
- The product generates a query intended to access or manipulate data in a data store such as a database, but it does not neutralize or incorrectly neutralizes special elements that can modify the intended logic of the query.
- Typical Severity
- Medium
- Abstraction Level
- Class
Key Information
- Published Date
- April 17, 2026
