{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-34162","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-25T20:12:04.197Z","datePublished":"2026-03-31T13:43:20.981Z","dateUpdated":"2026-03-31T14:33:31.305Z"},"containers":{"cna":{"title":"FastGPT: Unauthenticated SSRF via httpTools Endpoint Leads to Internal API Key Theft","problemTypes":[{"descriptions":[{"cweId":"CWE-306","lang":"en","description":"CWE-306: Missing Authentication for Critical Function","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-918","lang":"en","description":"CWE-918: Server-Side Request Forgery (SSRF)","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/labring/FastGPT/security/advisories/GHSA-w36r-f268-pwrj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/labring/FastGPT/security/advisories/GHSA-w36r-f268-pwrj"},{"name":"https://github.com/labring/FastGPT/pull/6640","tags":["x_refsource_MISC"],"url":"https://github.com/labring/FastGPT/pull/6640"},{"name":"https://github.com/labring/FastGPT/commit/bc7eae2ed61481a5e322208829be291faec58c00","tags":["x_refsource_MISC"],"url":"https://github.com/labring/FastGPT/commit/bc7eae2ed61481a5e322208829be291faec58c00"},{"name":"https://github.com/labring/FastGPT/releases/tag/v4.14.9.5","tags":["x_refsource_MISC"],"url":"https://github.com/labring/FastGPT/releases/tag/v4.14.9.5"}],"affected":[{"vendor":"labring","product":"FastGPT","versions":[{"version":"< 4.14.9.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-31T13:43:20.981Z"},"descriptions":[{"lang":"en","value":"FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT HTTP tools testing endpoint (/api/core/app/httpTools/runTool) is exposed without any authentication. This endpoint acts as a full HTTP proxy — it accepts a user-supplied baseUrl, toolPath, HTTP method, custom headers, and body, then makes a server-side HTTP request and returns the complete response to the caller. This issue has been patched in version 4.14.9.5."}],"source":{"advisory":"GHSA-w36r-f268-pwrj","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/labring/FastGPT/security/advisories/GHSA-w36r-f268-pwrj","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-31T14:33:27.055617Z","id":"CVE-2026-34162","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-31T14:33:31.305Z"}}]}}