CVE-2026-26003

Source
https://cve.org/CVERecord?id=CVE-2026-26003
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26003.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26003
Aliases
  • GHSA-wcrg-g824-9gfg
Published
2026-02-10T17:52:38.919Z
Modified
2026-02-12T08:49:20.527235Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L CVSS Calculator
Summary
FastGPT Plugin forwarding request is not authenticated, posing a serious risk of attack
Details

FastGPT is an AI Agent building platform. From 4.14.0 to 4.14.5, attackers can directly access the plugin system through FastGPT/api/plugin/xxx without authentication, thereby threatening the plugin system. This may cause the plugin system to crash and the loss of plugin installation status, but it will not result in key leakage. For older versions, as there are only operation interfaces for obtaining information, the impact is almost negligible. This vulnerability is fixed in 4.14.5-fix.

Database specific
{
    "cwe_ids": [
        "CWE-601"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/26xxx/CVE-2026-26003.json"
}
References

Affected packages

Git / github.com/labring/fastgpt

Affected ranges

Type
GIT
Repo
https://github.com/labring/fastgpt
Events

Affected versions

v4.*
v4.14.0-fix
v4.14.1
v4.14.2
v4.14.2-fix
v4.14.3
v4.14.4
v4.14.4-cve

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26003.json"