High severity8.8NVD Advisory· Published Apr 17, 2026· Updated Apr 27, 2026
CVE-2026-40352
CVE-2026-40352
Description
FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the "old password" verification by injecting MongoDB query operators. This allows an attacker who has gained a low-privileged session to change the password of their account (or others if combined with ID manipulation) without knowing the current one, leading to full account takeover and persistence. This issue has been fixed in version 4.14.9.5.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/labring/FastGPT/commit/bd966d479fbe414d02679cf79f9eaaab3d100a2dnvdPatch
- github.com/labring/FastGPT/security/advisories/GHSA-422w-vrfj-72g6nvdExploitVendor Advisory
- github.com/labring/FastGPT/releases/tag/v4.14.9.5nvdProductRelease Notes
News mentions
0No linked articles in our index yet.