


Perceptive Security
SOC/SIEM Consultancy

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and…
Published:
30 maart 2026 om 22:00:00
Alert date:
31 maart 2026 om 17:08:47
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
FastGPT, an AI Agent building platform, contains a Server-Side Request Forgery (SSRF) vulnerability in versions prior to 4.14.9.5. The MCP tools endpoints accept user-supplied URLs and make server-side HTTP requests without validating if the URL points to internal/private network addresses. Authenticated attackers can exploit this to scan internal networks, access cloud metadata services, and interact with internal services like MongoDB and Redis. The vulnerability exists because the MCP endpoints do not use the existing isInternalAddress() function that provides SSRF protection in other parts of the application. This issue has been patched in version 4.14.9.5.
Technical details
Mitigation steps:
Affected products:
FastGPT
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34163
https://github.com/labring/FastGPT/commit/bc7eae2ed61481a5e322208829be291faec58c00
https://github.com/labring/FastGPT/pull/6640
https://github.com/labring/FastGPT/releases/tag/v4.14.9.5
https://github.com/labring/FastGPT/security/advisories/GHSA-x9vj-5m4j-9mfv
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
