Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62612: CWE-918: Server-Side Request Forgery (SSRF) in labring FastGPT

0
Medium
VulnerabilityCVE-2025-62612cvecve-2025-62612cwe-918
Published: Wed Oct 22 2025 (10/22/2025, 20:45:17 UTC)
Source: CVE Database V5
Vendor/Project: labring
Product: FastGPT

Description

FastGPT is an AI Agent building platform. Prior to version 4.11.1, in the workflow file reading node, the network link is not security-verified, posing a risk of SSRF attacks. This issue has been patched in version 4.11.1.

AI-Powered Analysis

AILast updated: 10/22/2025, 21:05:44 UTC

Technical Analysis

CVE-2025-62612 is a Server-Side Request Forgery (SSRF) vulnerability identified in labring's FastGPT platform, an AI Agent building tool. The vulnerability resides in the workflow file reading node where the application fails to properly validate or restrict network links before accessing them. This lack of security verification allows an attacker to craft malicious inputs that cause the server to initiate unauthorized HTTP or network requests to internal or external resources. SSRF vulnerabilities can be leveraged to bypass firewalls, access internal services, or exfiltrate sensitive information. The vulnerability affects all FastGPT versions prior to 4.11.1 and was assigned a CVSS 4.0 score of 6.9, indicating a medium severity level. The attack vector is network-based with low complexity, requiring no privileges or user interaction, and no impact on confidentiality, integrity, or availability was explicitly noted, but the potential for internal network reconnaissance or data exposure exists. No known exploits have been reported in the wild as of the publication date, but the risk remains significant given the nature of SSRF attacks. The vendor has addressed the issue by patching the vulnerability in version 4.11.1, which includes proper validation and security checks on network links in the workflow file reading node. Organizations using FastGPT should apply this update promptly. Additionally, monitoring outbound requests from the application and implementing network segmentation can reduce exploitation risk.

Potential Impact

For European organizations, the SSRF vulnerability in FastGPT could enable attackers to pivot from the compromised application to internal network resources that are otherwise inaccessible externally. This could lead to unauthorized access to sensitive internal services, data leakage, or further exploitation within the network. Given FastGPT's role in AI agent development, organizations relying on it for critical AI workflows may face disruption or compromise of their AI pipelines. The medium severity rating reflects the potential for moderate impact without immediate system compromise, but the ease of exploitation and lack of required authentication increase the risk profile. Industries with sensitive internal infrastructures, such as finance, healthcare, and government agencies in Europe, could be particularly vulnerable if they deploy affected versions. The absence of known active exploits provides a window for proactive mitigation, but the threat should be taken seriously due to SSRF's history as a vector for lateral movement and data exfiltration.

Mitigation Recommendations

1. Immediately upgrade all FastGPT instances to version 4.11.1 or later, which contains the patch for CVE-2025-62612. 2. Implement strict egress network filtering to restrict outbound HTTP/HTTPS requests from FastGPT servers to only trusted destinations. 3. Employ network segmentation to isolate FastGPT servers from sensitive internal resources, limiting the impact of any SSRF exploitation. 4. Monitor application logs and network traffic for unusual outbound requests or patterns indicative of SSRF attempts. 5. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities within AI development platforms. 6. Educate development and security teams about SSRF risks and secure coding practices, especially when handling external inputs that trigger network requests. 7. If upgrading immediately is not feasible, consider disabling or restricting the workflow file reading node functionality that processes network links until patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.268Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f943aa5256beec8ef3de6c

Added to database: 10/22/2025, 8:50:50 PM

Last enriched: 10/22/2025, 9:05:44 PM

Last updated: 10/22/2025, 11:49:30 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats