Vulnerability Description
FastGPT is an AI Agent building platform. Prior to 4.14.10.4, Broken Access Control vulnerability (IDOR/BOLA) allows any authenticated team to access and execute applications belonging to other teams by supplying a foreign appId. While the API correctly validates the team token, it does not verify that the requested application belongs to the authenticated team. This leads to cross-tenant data exposure and unauthorized execution of private AI workflows. This vulnerability is fixed in 4.14.10.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fastgpt | Fastgpt | < 4.14.10.4 |
Related Weaknesses (CWE)
References
- https://github.com/labring/FastGPT/releases/tag/v4.14.10.4Release Notes
- https://github.com/labring/FastGPT/security/advisories/GHSA-gc8m-w37w-24hwVendor Advisory
FAQ
What is CVE-2026-40252?
CVE-2026-40252 is a vulnerability with a CVSS score of 8.1 (HIGH). FastGPT is an AI Agent building platform. Prior to 4.14.10.4, Broken Access Control vulnerability (IDOR/BOLA) allows any authenticated team to access and execute applications belonging to other teams ...
How severe is CVE-2026-40252?
CVE-2026-40252 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40252?
Check the references section above for vendor advisories and patch information. Affected products include: Fastgpt Fastgpt.