Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastgpt
Fastgpt fastgpt |
|
| CPEs | cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fastgpt
Fastgpt fastgpt |
|
| Metrics |
cvssV3_1
|
Mon, 13 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labring
Labring fastgpt |
|
| Vendors & Products |
Labring
Labring fastgpt |
Fri, 10 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FastGPT is an AI Agent building platform. Prior to 4.14.10.4, Broken Access Control vulnerability (IDOR/BOLA) allows any authenticated team to access and execute applications belonging to other teams by supplying a foreign appId. While the API correctly validates the team token, it does not verify that the requested application belongs to the authenticated team. This leads to cross-tenant data exposure and unauthorized execution of private AI workflows. This vulnerability is fixed in 4.14.10.4. | |
| Title | Broken Access Control (IDOR) Leading to Cross-Tenant Application Access in FastGPT | |
| Weaknesses | CWE-284 CWE-639 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-13T16:14:30.862Z
Reserved: 2026-04-10T17:31:45.786Z
Link: CVE-2026-40252
Updated: 2026-04-13T16:14:26.664Z
Status : Analyzed
Published: 2026-04-10T21:16:27.907
Modified: 2026-04-21T18:52:50.580
Link: CVE-2026-40252
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:57:20Z