๐Ÿ” CVE Alert

CVE-2026-33075

UNKNOWN 0.0

FastGPT has Arbitrary Code Execution in GitHub Actions via pull_request_target in fastgpt-preview-image.yml

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fastgpt-preview-image.yml workflow is vulnerable to arbitrary code execution and secret exfiltration by any external contributor. It uses pull_request_target (which runs with access to repository secrets) but checks out code from the pull request author's fork, then builds and pushes Docker images using attacker-controlled Dockerfiles. This also enables a supply chain attack via the production container registry. A patch was not available at the time of publication.

CWE CWE-494 CWE-829
Vendor labring
Product fastgpt
Published Mar 20, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for labring fastgpt

Be the first to know when new unknown vulnerabilities affecting labring fastgpt are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

labring / FastGPT
<= 4.14.8.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/labring/FastGPT/security/advisories/GHSA-xfx8-w35j-485c