Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32128: CWE-184: Incomplete List of Disallowed Inputs in labring FastGPT

0
Medium
VulnerabilityCVE-2026-32128cvecve-2026-32128cwe-184
Published: Wed Mar 11 2026 (03/11/2026, 21:30:26 UTC)
Source: CVE Database V5
Vendor/Project: labring
Product: FastGPT

Description

CVE-2026-32128 is a medium severity vulnerability in labring's FastGPT AI Agent platform versions 4. 14. 7 and earlier. The issue lies in the Python Sandbox component, which attempts to prevent file writes using static detection and seccomp filters. However, attackers can bypass these guardrails by remapping the standard output file descriptor (fd 1) to an arbitrary writable file descriptor using fcntl. This remapping allows sys. stdout. write() calls to write to files despite the intended restrictions, enabling arbitrary file creation or overwriting within the sandbox container. Exploitation requires low privileges but no user interaction and can impact confidentiality, integrity, and availability of data within the sandbox environment. There are no known exploits in the wild yet, and no patches have been linked at the time of publication.

AI-Powered Analysis

AILast updated: 03/11/2026, 21:59:36 UTC

Technical Analysis

FastGPT, an AI Agent building platform by labring, includes a Python Sandbox (fastgpt-sandbox) designed to restrict file system writes to enhance security. In versions 4.14.7 and earlier, the sandbox employs guardrails combining static detection and seccomp filters to block file write operations, specifically monitoring writes to the standard output file descriptor (fd 1). However, this protection is incomplete due to an input validation flaw categorized under CWE-184 (Incomplete List of Disallowed Inputs). An attacker with limited privileges can exploit this by using the fcntl system call to remap fd 1 (stdout) to another writable file descriptor. Because the seccomp rule only restricts writes to fd 1, subsequent writes via sys.stdout.write() are still permitted but redirected to an arbitrary file. This bypass allows the creation or overwriting of files inside the sandbox container, violating the intended no-write policy. The vulnerability does not require user interaction and can be exploited remotely if an attacker has low-level access to the sandbox environment. The CVSS 3.1 score is 6.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, combined with low attack complexity and partial privileges required. No known public exploits or patches are currently available, highlighting the need for proactive mitigation by users of affected FastGPT versions.

Potential Impact

This vulnerability allows attackers to bypass sandbox restrictions and perform arbitrary file writes within the FastGPT sandbox container. The ability to create or overwrite files can lead to several adverse outcomes, including unauthorized data modification, insertion of malicious code or backdoors, and potential sandbox escape if combined with other vulnerabilities. Confidentiality may be compromised if sensitive data is overwritten or exfiltrated. Integrity is directly affected as attackers can alter files, potentially undermining AI agent behavior or injecting malicious payloads. Availability could be impacted if critical files are corrupted or deleted, causing service disruption. Organizations relying on FastGPT for AI agent deployment, especially in multi-tenant or cloud environments, face risks of lateral movement, privilege escalation, and persistent compromise. Although exploitation requires some level of access, the low complexity and lack of user interaction make this a significant threat to environments where FastGPT is deployed.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Upgrade FastGPT to a version later than 4.14.7 once patches become available from labring, as this is the definitive fix. 2) Until patches are released, restrict access to the FastGPT sandbox environment to trusted users only, minimizing the risk of exploitation. 3) Employ additional sandboxing or container hardening techniques such as mandatory access controls (e.g., SELinux, AppArmor) to limit file system write permissions beyond FastGPT's internal controls. 4) Monitor file system changes within sandbox containers for unexpected file creation or modification, using file integrity monitoring tools. 5) Review and restrict the use of fcntl or similar system calls within the sandbox environment if possible, to prevent remapping of file descriptors. 6) Implement network segmentation and strict access controls around FastGPT deployments to reduce attack surface. 7) Conduct regular security audits and penetration tests focusing on sandbox escape vectors. These steps go beyond generic advice by focusing on controlling the specific bypass technique and monitoring for its exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T22:19:36.545Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1e24f2f860ef943814c6b

Added to database: 3/11/2026, 9:44:47 PM

Last enriched: 3/11/2026, 9:59:36 PM

Last updated: 3/11/2026, 10:50:58 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses