Report: CVE-2026-42345 - FastGPT: Cloud metadata endpoint SSRF protection bypass via port specification,

Report: CVE-2026-42345 - FastGPT: Cloud metadata endpoint SSRF protection bypass via port specification,

CVE ID :CVE-2026-42345 Published : May 8, 2026, 11:16 p.m. | 24 minutes ago Description :FastGPT is an AI Agent building platform. In versions 4.14.11 and prior, FastGPT's isInternalAddress() function in packages/service/common/system/utils.ts blocks cloud metadata endpoints using a fullUrl.startsWith() check against a hardcoded list. This check can be bypassed using at least 7 different URL encoding techniques, all of which resolve to the same cloud metadata service but do not match the blocklist patterns. Additionally, the broader private IP check (isInternalIPv4/isInternalIPv6) is disabled by default because CHECK_INTERNAL_IP defaults to false (not 'true'), so these bypasses reach the metadata endpoint without any further validation. At time of publication, there are no publicly available patches. Severity: 7.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
May 8, 2026