Critical Vulnerability in FastGPT Allows API Key Exfiltration and Internal Network Access
CVE-2026-34162 in FastGPT allows unauthenticated attackers to exfiltrate API keys and gain complete access to internal services managed by Docker Compose by sending arbitrary HTTP requests, leading to potential compromise of the internal network.
A critical vulnerability, CVE-2026-34162, has been identified in FastGPT, a framework for building AI-powered applications. The vulnerability resides in the HTTP tools testing endpoint, which is accessible without authentication. This allows an unauthenticated attacker to send arbitrary server-side HTTP requests and receive the responses. If the default admin token is not changed, an attacker can access the proxy management API to exfiltrate third-party API keys. Furthermore, the attacker can interact with and potentially exploit all Docker Compose internal services by manipulating HTTP headers. This issue was publicly disclosed on April 1, 2026, by CCB Belgium, who strongly recommends immediate patching. The vulnerability is patched in version 4.14.9.5. Successful exploitation can lead to complete control over the internal network and sensitive data exposure.
Attack Chain
- An unauthenticated attacker identifies a vulnerable FastGPT instance exposed to the network.
- The attacker accesses the FastGPT HTTP tools testing endpoint without authentication.
- The attacker uses the endpoint to send arbitrary HTTP requests to the FastGPT server itself or internal services.
- If the default admin token is unchanged, the attacker uses the HTTP proxy functionality to access the proxy management API.
- The attacker exfiltrates third-party API keys stored within the FastGPT configuration.
- The attacker leverages the exfiltrated API keys to access external services, potentially causing further damage.
- The attacker uses the HTTP proxy functionality, including custom headers, to interact with other Docker Compose internal services.
- The attacker exploits vulnerabilities in these internal services, leading to complete access to the internal network and sensitive data.
Impact
Successful exploitation of CVE-2026-34162 can lead to the complete compromise of the FastGPT server and the internal network it manages. An attacker can exfiltrate sensitive API keys, gain unauthorized access to internal services, and potentially pivot to other systems within the network. The vulnerability poses a high risk to the confidentiality and integrity of data, potentially impacting numerous organizations relying on FastGPT for their AI-powered applications. The CCB Belgium advisory highlights the potential for widespread impact given the nature of the vulnerability and the popularity of FastGPT.
Recommendation
- Immediately patch FastGPT instances to version 4.14.9.5 to remediate CVE-2026-34162 as per the vendor advisory.
- Implement the remediations documented in the vendor advisory to strengthen the security of FastGPT instances.
- Upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion, as recommended by the CCB.
- Investigate and report any suspected intrusions using the incident reporting URL found in the advisory (https://ccb.belgium.be/report-incident).
Detection coverage 2
Detect Access to FastGPT HTTP Testing Endpoint
mediumDetects unauthorized access to the FastGPT HTTP tools testing endpoint, which is vulnerable to CVE-2026-34162.
Detect HTTP Requests via FastGPT Testing Endpoint
highDetects HTTP requests being made through the FastGPT testing endpoint, potentially indicating exploitation of CVE-2026-34162.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
url
| Type | Value |
|---|---|
| url | https://ccb.belgium.be/report-incident |