Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastgpt
Fastgpt fastgpt |
|
| CPEs | cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fastgpt
Fastgpt fastgpt |
|
| Metrics |
cvssV3_1
|
Fri, 20 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labring
Labring fastgpt |
|
| Vendors & Products |
Labring
Labring fastgpt |
Fri, 20 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fastgpt-preview-image.yml workflow is vulnerable to arbitrary code execution and secret exfiltration by any external contributor. It uses pull_request_target (which runs with access to repository secrets) but checks out code from the pull request author's fork, then builds and pushes Docker images using attacker-controlled Dockerfiles. This also enables a supply chain attack via the production container registry. A patch was not available at the time of publication. | |
| Title | FastGPT has Arbitrary Code Execution in GitHub Actions via pull_request_target in fastgpt-preview-image.yml | |
| Weaknesses | CWE-494 CWE-829 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T13:48:05.632Z
Reserved: 2026-03-17T19:27:06.344Z
Link: CVE-2026-33075
Updated: 2026-03-20T13:48:02.604Z
Status : Analyzed
Published: 2026-03-20T09:16:15.877
Modified: 2026-03-23T15:42:34.453
Link: CVE-2026-33075
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:29:48Z