CVE-2026-40351

| EUVD-2026-23557 CRITICAL
2026-04-17 GitHub_M
9.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Re-analysis Queued
Apr 17, 2026 - 22:22 vuln.today
cvss_changed
patch_available
Apr 17, 2026 - 22:16 EUVD
Analysis Generated
Apr 17, 2026 - 22:09 vuln.today

DescriptionNVD

FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password-based login endpoint uses TypeScript type assertion without runtime validation, allowing an unauthenticated attacker to pass a MongoDB query operator object (e.g., {"$ne": ""}) as the password field. This NoSQL injection bypasses the password check, enabling login as any user including the root administrator. This issue has been fixed in version 4.14.9.5.

AnalysisAI

NoSQL injection in FastGPT <4.14.9.5 password authentication allows unauthenticated remote attackers to bypass login controls and access any account, including root administrator, by submitting MongoDB query operators instead of plaintext passwords. The vulnerability stems from missing runtime validation on password fields in the login endpoint. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all FastGPT deployments running versions below 4.14.9.5 and inventory affected systems. Within 7 days: Implement network segmentation to restrict access to the login endpoint (port/endpoint details dependent on deployment architecture) to authorized administrative IP ranges only, and enable comprehensive login attempt logging and alerting. …

Sign in for detailed remediation steps.

Share

CVE-2026-40351 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy