Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastgpt
Fastgpt fastgpt |
|
| CPEs | cpe:2.3:a:fastgpt:fastgpt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fastgpt
Fastgpt fastgpt |
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labring
Labring fastgpt |
|
| Vendors & Products |
Labring
Labring fastgpt |
Fri, 17 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password-based login endpoint uses TypeScript type assertion without runtime validation, allowing an unauthenticated attacker to pass a MongoDB query operator object (e.g., {"$ne": ""}) as the password field. This NoSQL injection bypasses the password check, enabling login as any user including the root administrator. This issue has been fixed in version 4.14.9.5. | |
| Title | FastGPT: NoSQL Injection in loginByPassword leads to Authentication Bypass | |
| Weaknesses | CWE-943 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T14:57:15.664Z
Reserved: 2026-04-10T22:50:01.359Z
Link: CVE-2026-40351
Updated: 2026-04-20T14:47:37.630Z
Status : Analyzed
Published: 2026-04-17T22:16:32.793
Modified: 2026-04-27T19:39:32.913
Link: CVE-2026-40351
No data.
OpenCVE Enrichment
Updated: 2026-04-18T09:00:05Z