FastGPT Vulnerability: Cloud Metadata Bypass via URL Encoding (CVE-2026-42345)
A critical vulnerability, CVE-2026-42345, has been identified in FastGPT versions 4.14.11 and prior. The National Vulnerability Database reports that the isInternalAddress() function, intended to block cloud metadata endpoints, can be bypassed. This function relies on fullUrl.startsWith() checks against a hardcoded blocklist, a method easily circumvented using various URL encoding techniques.
Attackers can leverage at least seven distinct URL encoding methods to bypass these checks, allowing access to cloud metadata services. Further compounding the issue, the broader private IP validation (isInternalIPv4/isInternalIPv6) is disabled by default, as CHECK_INTERNAL_IP is set to false. This means that once the initial URL encoding bypass is successful, no further validation prevents access to sensitive metadata endpoints.
This vulnerability, rated High severity with a CVSS score of 7.7, exposes FastGPT instances to potential information disclosure. As of the National Vulnerability Database’s publication, no patches are publicly available. Defenders must understand that this isn’t just a theoretical bypass; it’s a fundamental flaw in how FastGPT attempts to isolate internal resources, making it trivial for an attacker to reach cloud provider APIs.
What This Means For You
- If your organization uses FastGPT, you are exposed to CVE-2026-42345. This vulnerability allows attackers to access cloud metadata endpoints, potentially leading to credential theft, privilege escalation, or further network compromise within your cloud environment. Immediately assess your FastGPT deployments and evaluate alternative mitigation strategies until an official patch is released. Assume compromise if you are running vulnerable versions.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-42345 - FastGPT Cloud Metadata Bypass via URL Encoding
title: CVE-2026-42345 - FastGPT Cloud Metadata Bypass via URL Encoding
id: scw-2026-05-08-ai-1
status: experimental
level: high
description: |
Detects attempts to bypass FastGPT's internal address check by using various forms of URL encoding to reach the cloud metadata service. The `isInternalAddress()` function in FastGPT versions prior to 4.14.11 can be bypassed by encoding the path to the metadata endpoint. This rule specifically looks for common URL-encoded variations of the cloud metadata IP addresses (169.254.169.254 and its IPv6 equivalent) within the request URI.
author: SCW Feed Engine (AI-generated)
date: 2026-05-08
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-42345/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '%252f%252f169.254.169.254'
- '%252f%252f169.254.169.254%252f'
- '%252f%252f[::ffff:169.254.169.254]'
- '%252f%252f[::ffff:169.254.169.254]%252f'
- '%25252f%25252f169.254.169.254'
- '%25252f%25252f169.254.169.254%25252f'
- '%25252f%25252f[::ffff:169.254.169.254]'
- '%25252f%25252f[::ffff:169.254.169.254]%25252f'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42345 | SSRF | FastGPT versions 4.14.11 and prior |
| CVE-2026-42345 | SSRF | Bypass of isInternalAddress() function in packages/service/common/system/utils.ts |
| CVE-2026-42345 | Misconfiguration | CHECK_INTERNAL_IP defaults to false, disabling private IP checks |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 09, 2026 at 02:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.