Cyber Posture

CVE-2026-34163

HighPublic PoC

Published: 31 March 2026

Published
31 March 2026
Modified
01 April 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0004 11.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34163 is a high-severity SSRF (CWE-918) vulnerability in Fastgpt Fastgpt. Its CVSS base score is 7.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as APIs and Models; in the Protocol-Specific Risks risk domain.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of user-supplied URL parameters in MCP tools endpoints to block SSRF requests to internal/private networks.

prevent

Enforces information flow control policies preventing unauthorized server-side access to internal services like MongoDB and Redis via unvalidated URLs.

prevent

Provides boundary protection mechanisms such as proxies or firewalls to restrict application outbound connections to cloud metadata and internal networks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1522 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SSRF vulnerability in public-facing app enables T1190; directly facilitates internal network scanning (T1046), cloud metadata access (T1522), and interaction with internal databases like MongoDB/Redis (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and /api/core/app/mcpTools/runTool) accept a user-supplied URL parameter and make server-side HTTP requests to it without validating whether the URL points to…

more

an internal/private network address. Although the application has a dedicated isInternalAddress() function for SSRF protection (used in other endpoints like the HTTP workflow node), the MCP tools endpoints do not call this function. An authenticated attacker can use these endpoints to scan internal networks, access cloud metadata services, and interact with internal services such as MongoDB and Redis. This issue has been patched in version 4.14.9.5.

Deeper analysisAI

CVE-2026-34163 is a server-side request forgery (SSRF) vulnerability, classified under CWE-918, affecting FastGPT, an AI Agent building platform, in versions prior to 4.14.9.5. The issue resides in the MCP (Model Context Protocol) tools endpoints, specifically /api/core/app/mcpTools/getTools and /api/core/app/mcpTools/runTool, which accept a user-supplied URL parameter and issue server-side HTTP requests to it without validating whether the URL targets an internal or private network address. Although FastGPT includes an isInternalAddress() function for SSRF protection in other components like the HTTP workflow node, these MCP endpoints do not invoke it, enabling unauthorized internal network access. The vulnerability carries a CVSS v3.1 base score of 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).

An authenticated attacker with low privileges can exploit this vulnerability over the network with low complexity and no user interaction required. By supplying malicious URLs to the affected endpoints, the attacker can scan internal networks, access cloud metadata services, and interact with internal services such as MongoDB and Redis, potentially leading to high confidentiality impacts due to the changed scope.

The vulnerability has been patched in FastGPT version 4.14.9.5. Security practitioners should upgrade to this version or later. Relevant resources include the patch commit at https://github.com/labring/FastGPT/commit/bc7eae2ed61481a5e322208829be291faec58c00, the associated pull request at https://github.com/labring/FastGPT/pull/6640, the release notes at https://github.com/labring/FastGPT/releases/tag/v4.14.9.5, and the GitHub security advisory at https://github.com/labring/FastGPT/security/advisories/GHSA-x9vj-5m4j-9mfv.

As FastGPT is an AI Agent building platform, this SSRF vulnerability highlights risks in AI/ML infrastructure where internal services may handle sensitive model data or configurations. No public reports of real-world exploitation are available at this time.

Details

CWE(s)

Affected Products

fastgpt
fastgpt
≤ 4.14.9.5

AI Security AnalysisAI

AI Category
APIs and Models
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: ai, mcp, model context protocol, mcp

CVEs Like This One

CVE-2026-34162Same product: Fastgpt Fastgpt
CVE-2026-40351Same product: Fastgpt Fastgpt
CVE-2026-40252Same product: Fastgpt Fastgpt
CVE-2026-40352Same product: Fastgpt Fastgpt
CVE-2026-33075Same product: Fastgpt Fastgpt
CVE-2026-31945Shared CWE-918
CVE-2025-54381Shared CWE-918
CVE-2026-34954Shared CWE-918
CVE-2025-62616Shared CWE-918
CVE-2026-40114Shared CWE-918

References