Critical NoSQL Injection in FastGPT Allows Root Admin Takeover
The National Vulnerability Database has detailed CVE-2026-40351, a critical NoSQL injection vulnerability in FastGPT, an AI Agent building platform. This flaw, present in versions prior to 4.14.9.5, stems from improper validation in the password-based login endpoint. Specifically, the system uses TypeScript type assertion without adequate runtime validation.
This oversight allows an unauthenticated attacker to bypass the password check entirely. By submitting a MongoDB query operator object, such as {"$ne": ""}, as the password, attackers can log in as any user, including the root administrator. This presents a complete compromise risk for FastGPT deployments.
FastGPT has addressed this issue in version 4.14.9.5. Organizations leveraging FastGPT for their AI agent infrastructure are at severe risk if they have not yet patched to the fixed version. The National Vulnerability Database assigns this a CVSS score of 9.8 (CRITICAL), underscoring the immediate danger.
What This Means For You
- If your organization uses FastGPT, you need to check your version immediately. Patch to 4.14.9.5 or higher without delay. This isn't theoretical; an unauthenticated attacker can become your root administrator. Audit logs for suspicious login attempts pre-patch and rotate all FastGPT administrator credentials after patching.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40351 | Auth Bypass | FastGPT versions prior to 4.14.9.5 |
| CVE-2026-40351 | NoSQL Injection | FastGPT password-based login endpoint |
| CVE-2026-40351 | Auth Bypass | MongoDB query operator object (e.g., {"$ne": ""}) in password field |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 18, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.