Critical severity9.8NVD Advisory· Published Apr 17, 2026· Updated Apr 27, 2026
CVE-2026-40351
CVE-2026-40351
Description
FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password-based login endpoint uses TypeScript type assertion without runtime validation, allowing an unauthenticated attacker to pass a MongoDB query operator object (e.g., {"$ne": ""}) as the password field. This NoSQL injection bypasses the password check, enabling login as any user including the root administrator. This issue has been fixed in version 4.14.9.5.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/labring/FastGPT/commit/bd966d479fbe414d02679cf79f9eaaab3d100a2dnvdPatch
- github.com/labring/FastGPT/security/advisories/GHSA-x8mx-2mr7-h9xgnvdExploitMitigationVendor Advisory
- github.com/labring/FastGPT/releases/tag/v4.14.9.5nvdProductRelease Notes
News mentions
0No linked articles in our index yet.