CVE-2026-42302
FastGPT: Unauthenticated Remote Code Execution (RCE) via code-server Misconfiguration in agent-sandbox
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
FastGPT is an AI Agent building platform. From version 4.14.10 to before version 4.14.13, the agent-sandbox component of FastGPT is vulnerable to unauthenticated Remote Code Execution (RCE). The startup script entrypoint.sh initializes code-server with the --auth none flag and binds the service to all network interfaces (0.0.0.0:8080). This configuration allows any user with network access to the port to bypass authentication and gain full control over the sandbox environment. This issue has been patched in version 4.14.13.
| CWE | CWE-306 |
| Vendor | labring |
| Product | fastgpt |
| Published | May 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for labring fastgpt
Be the first to know when new critical vulnerabilities affecting labring fastgpt are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
labring / FastGPT
>= 4.14.10, < 4.14.13
References
github.com: https://github.com/labring/FastGPT/security/advisories/GHSA-34rc-438g-7w78 github.com: https://github.com/labring/FastGPT/pull/6781 github.com: https://github.com/labring/FastGPT/commit/9d1cafce9241430fb5bcdd646455055c5f4ae0a4 github.com: https://github.com/labring/FastGPT/releases/tag/v4.14.13