Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62612: CWE-918: Server-Side Request Forgery (SSRF) in labring FastGPT

0
Medium
VulnerabilityCVE-2025-62612cvecve-2025-62612cwe-918
Published: Wed Oct 22 2025 (10/22/2025, 20:45:17 UTC)
Source: CVE Database V5
Vendor/Project: labring
Product: FastGPT

Description

FastGPT is an AI Agent building platform. Prior to version 4.11.1, in the workflow file reading node, the network link is not security-verified, posing a risk of SSRF attacks. This issue has been patched in version 4.11.1.

AI-Powered Analysis

AILast updated: 10/29/2025, 21:47:08 UTC

Technical Analysis

CVE-2025-62612 is a Server-Side Request Forgery (SSRF) vulnerability identified in labring's FastGPT platform, an AI Agent building tool. The vulnerability resides in the workflow file reading node where the application fails to properly validate or restrict network links before fetching them. This lack of security verification allows an attacker to craft malicious requests that cause the FastGPT server to initiate arbitrary HTTP requests to internal or external systems. SSRF vulnerabilities can be leveraged to bypass firewalls, access internal-only services, or perform reconnaissance within the victim's network. The vulnerability affects all FastGPT versions prior to 4.11.1 and was assigned a CVSS 4.0 score of 6.9, reflecting a medium severity level. The attack vector is network-based, requires no authentication or user interaction, and does not depend on privileges, making it relatively easy to exploit remotely. Although no active exploits have been reported, the potential for internal network exposure and data leakage is significant, especially in environments where FastGPT is integrated with sensitive AI workflows or internal services. The vendor has addressed the issue in version 4.11.1 by implementing proper security verification of network links in the workflow file reading node, effectively mitigating the SSRF risk.

Potential Impact

For European organizations, the SSRF vulnerability in FastGPT presents a risk of unauthorized internal network access, potentially exposing sensitive internal services, databases, or metadata endpoints that are not intended to be publicly accessible. This could lead to data leakage, internal reconnaissance by attackers, or pivoting to further compromise internal systems. Organizations leveraging FastGPT for AI agent development in sectors such as finance, healthcare, or critical infrastructure could face confidentiality breaches or operational disruptions. The medium severity rating indicates a moderate risk, but the ease of exploitation without authentication increases the urgency for patching. Additionally, SSRF can be a stepping stone for more complex attacks, including remote code execution or privilege escalation if combined with other vulnerabilities. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits following public disclosure.

Mitigation Recommendations

European organizations using FastGPT should immediately upgrade to version 4.11.1 or later to apply the official patch that enforces security verification on network links in the workflow file reading node. Until the upgrade is applied, organizations should implement network-level controls such as restricting outbound HTTP/HTTPS requests from FastGPT servers to only trusted destinations using firewall rules or proxy whitelisting. Monitoring and logging of outbound requests from FastGPT instances can help detect anomalous or unauthorized requests indicative of SSRF exploitation attempts. Additionally, applying network segmentation to isolate FastGPT servers from sensitive internal services can limit the potential impact of SSRF exploitation. Security teams should conduct internal audits to identify any instances of FastGPT running vulnerable versions and prioritize remediation. Finally, educating developers and administrators on SSRF risks and secure coding practices for AI workflow integrations will help prevent similar issues in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.268Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f943aa5256beec8ef3de6c

Added to database: 10/22/2025, 8:50:50 PM

Last enriched: 10/29/2025, 9:47:08 PM

Last updated: 12/5/2025, 11:54:59 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats