CVE-2026-34162

| EUVD-2026-17445 CRITICAL
2026-03-31 GitHub_M
10.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 31, 2026 - 14:30 vuln.today
EUVD ID Assigned
Mar 31, 2026 - 14:30 euvd
EUVD-2026-17445
CVE Published
Mar 31, 2026 - 13:43 nvd
CRITICAL 10.0

Description

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT HTTP tools testing endpoint (/api/core/app/httpTools/runTool) is exposed without any authentication. This endpoint acts as a full HTTP proxy - it accepts a user-supplied baseUrl, toolPath, HTTP method, custom headers, and body, then makes a server-side HTTP request and returns the complete response to the caller. This issue has been patched in version 4.14.9.5.

Analysis

Unauthenticated HTTP proxy abuse in FastGPT (AI Agent platform) prior to v4.14.9.5 allows remote attackers to relay arbitrary HTTP requests through the server. The /api/core/app/httpTools/runTool endpoint accepts user-controlled URLs, methods, headers, and body parameters without authentication, functioning as an open proxy for network pivoting, credential theft, and internal network reconnaissance. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Immediately identify all FastGPT instances and document their versions using 'curl -s http://<instance>/api/version' or deployment records; restrict network access to the /api/core/app/httpTools/runTool endpoint via firewall or WAF rules to prevent external requests. Within 7 days: Upgrade all FastGPT deployments to v4.14.9.5 or later once released by vendor; if upgrade is blocked, implement strict IP allowlisting and disable the httpTools endpoint entirely if not operationally required. …

Sign in for detailed remediation steps.

Priority Score

50
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +50
POC: 0

Share

CVE-2026-34162 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy