{"api_version":"1","generated_at":"2026-04-18T00:47:02+00:00","cve":"CVE-2026-40352","urls":{"html":"https://cve.report/CVE-2026-40352","api":"https://cve.report/api/cve/CVE-2026-40352.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-40352","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-40352"},"summary":{"title":"FastGPT: NoSQL Injection in updatePasswordByOld Leads to Account Takeover","description":"FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the \"old password\" verification by injecting MongoDB query operators. This allows an attacker who has gained a low-privileged session to change the password of their account (or others if combined with ID manipulation) without knowing the current one, leading to full account takeover and persistence. This issue has been fixed in version 4.14.9.5.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-17 22:16:32","updated_at":"2026-04-17 22:16:32"},"problem_types":["CWE-943","CWE-943 CWE-943: Improper Neutralization of Special Elements in Data Query Logic"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/labring/FastGPT/security/advisories/GHSA-422w-vrfj-72g6","name":"https://github.com/labring/FastGPT/security/advisories/GHSA-422w-vrfj-72g6","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/labring/FastGPT/releases/tag/v4.14.9.5","name":"https://github.com/labring/FastGPT/releases/tag/v4.14.9.5","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/labring/FastGPT/commit/bd966d479fbe414d02679cf79f9eaaab3d100a2d","name":"https://github.com/labring/FastGPT/commit/bd966d479fbe414d02679cf79f9eaaab3d100a2d","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-40352","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40352","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"labring","product":"FastGPT","version":"affected < 4.14.9.5","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"FastGPT","vendor":"labring","versions":[{"status":"affected","version":"< 4.14.9.5"}]}],"descriptions":[{"lang":"en","value":"FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the \"old password\" verification by injecting MongoDB query operators. This allows an attacker who has gained a low-privileged session to change the password of their account (or others if combined with ID manipulation) without knowing the current one, leading to full account takeover and persistence. This issue has been fixed in version 4.14.9.5."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-943","description":"CWE-943: Improper Neutralization of Special Elements in Data Query Logic","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-17T21:09:32.913Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/labring/FastGPT/security/advisories/GHSA-422w-vrfj-72g6","tags":["x_refsource_CONFIRM"],"url":"https://github.com/labring/FastGPT/security/advisories/GHSA-422w-vrfj-72g6"},{"name":"https://github.com/labring/FastGPT/commit/bd966d479fbe414d02679cf79f9eaaab3d100a2d","tags":["x_refsource_MISC"],"url":"https://github.com/labring/FastGPT/commit/bd966d479fbe414d02679cf79f9eaaab3d100a2d"},{"name":"https://github.com/labring/FastGPT/releases/tag/v4.14.9.5","tags":["x_refsource_MISC"],"url":"https://github.com/labring/FastGPT/releases/tag/v4.14.9.5"}],"source":{"advisory":"GHSA-422w-vrfj-72g6","discovery":"UNKNOWN"},"title":"FastGPT: NoSQL Injection in updatePasswordByOld Leads to Account Takeover"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-40352","datePublished":"2026-04-17T21:09:32.913Z","dateReserved":"2026-04-10T22:50:01.359Z","dateUpdated":"2026-04-17T21:09:32.913Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-17 22:16:32","lastModifiedDate":"2026-04-17 22:16:32","problem_types":["CWE-943","CWE-943 CWE-943: Improper Neutralization of Special Elements in Data Query Logic"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"40352","Ordinal":"1","Title":"FastGPT: NoSQL Injection in updatePasswordByOld Leads to Account","CVE":"CVE-2026-40352","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"40352","Ordinal":"1","NoteData":"FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the \"old password\" verification by injecting MongoDB query operators. This allows an attacker who has gained a low-privileged session to change the password of their account (or others if combined with ID manipulation) without knowing the current one, leading to full account takeover and persistence. This issue has been fixed in version 4.14.9.5.","Type":"Description","Title":"FastGPT: NoSQL Injection in updatePasswordByOld Leads to Account"}]}}}