CVE-2026-40352: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in labring FastGPT
FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the "old password" verification by injecting MongoDB query operators. This allows an attacker who has gained a low-privileged session to change the password of their account (or others if combined with ID manipulation) without knowing the current one, leading to full account takeover and persistence. This issue has been fixed in version 4.14.9.5.
AI Analysis
Technical Summary
FastGPT, an AI Agent building platform by labring, had a NoSQL injection vulnerability (CWE-943) in its password change endpoint before version 4.14.9.5. Authenticated attackers could exploit this by injecting MongoDB query operators to bypass the old password check, allowing unauthorized password changes. This flaw could lead to full account takeover and persistence if combined with ID manipulation. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity. The fix is included in version 4.14.9.5.
Potential Impact
An attacker with a low-privileged authenticated session can bypass password verification and change passwords without knowing the current one. This can result in full account takeover and persistence, potentially affecting multiple accounts if ID manipulation is used. The vulnerability compromises confidentiality, integrity, and availability of user accounts in affected FastGPT versions.
Mitigation Recommendations
Upgrade FastGPT to version 4.14.9.5 or later, where this NoSQL injection vulnerability has been fixed. Patch status is confirmed by the vendor's versioning information. No additional mitigation steps are indicated in the advisory.
CVE-2026-40352: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in labring FastGPT
Description
FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the "old password" verification by injecting MongoDB query operators. This allows an attacker who has gained a low-privileged session to change the password of their account (or others if combined with ID manipulation) without knowing the current one, leading to full account takeover and persistence. This issue has been fixed in version 4.14.9.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
FastGPT, an AI Agent building platform by labring, had a NoSQL injection vulnerability (CWE-943) in its password change endpoint before version 4.14.9.5. Authenticated attackers could exploit this by injecting MongoDB query operators to bypass the old password check, allowing unauthorized password changes. This flaw could lead to full account takeover and persistence if combined with ID manipulation. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity. The fix is included in version 4.14.9.5.
Potential Impact
An attacker with a low-privileged authenticated session can bypass password verification and change passwords without knowing the current one. This can result in full account takeover and persistence, potentially affecting multiple accounts if ID manipulation is used. The vulnerability compromises confidentiality, integrity, and availability of user accounts in affected FastGPT versions.
Mitigation Recommendations
Upgrade FastGPT to version 4.14.9.5 or later, where this NoSQL injection vulnerability has been fixed. Patch status is confirmed by the vendor's versioning information. No additional mitigation steps are indicated in the advisory.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-10T22:50:01.359Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e2a83ebdfbbecc5994f149
Added to database: 4/17/2026, 9:38:06 PM
Last enriched: 4/17/2026, 9:53:03 PM
Last updated: 4/23/2026, 9:16:33 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.