top of page
perceptive_background_267k.jpg

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and…

Published:

30 maart 2026 om 22:00:00

Alert date:

31 maart 2026 om 17:08:47

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

FastGPT, an AI Agent building platform, contains a Server-Side Request Forgery (SSRF) vulnerability in versions prior to 4.14.9.5. The MCP tools endpoints accept user-supplied URLs and make server-side HTTP requests without validating if the URL points to internal/private network addresses. Authenticated attackers can exploit this to scan internal networks, access cloud metadata services, and interact with internal services like MongoDB and Redis. The vulnerability exists because the MCP endpoints do not use the existing isInternalAddress() function that provides SSRF protection in other parts of the application. This issue has been patched in version 4.14.9.5.

Technical details

Mitigation steps:

Affected products:

FastGPT

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page