CVE-2025-49131

6.3 MEDIUM
Published: June 09, 2025 Modified: December 29, 2025

Description

FastGPT is an open-source project that provides a platform for building, deploying, and operating AI-driven workflows and conversational agents. The Sandbox container (fastgpt-sandbox) is a specialized, isolated environment used by FastGPT to safely execute user-submitted or dynamically generated code in isolation. The sandbox before version 4.9.11 has insufficient isolation and inadequate restrictions on code execution by allowing overly permissive syscalls, which allows attackers to escape the intended sandbox boundaries. Attackers could exploit this to read and overwrite arbitrary files and bypass Python module import restrictions. This is patched in version 4.9.11 by restricting the allowed system calls to a safer subset and additional descriptive error messaging.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/labring/FastGPT/pkgs/container/fastgpt-sandbox
Source: security-advisories@github.com
Product
https://github.com/labring/FastGPT/pull/4958
Source: security-advisories@github.com
Issue Tracking
https://github.com/labring/FastGPT/releases/tag/v4.9.11
Source: security-advisories@github.com
Release Notes
https://github.com/labring/FastGPT/security/advisories/GHSA-f3pf-r3g7-g895
Source: security-advisories@github.com
Vendor Advisory

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.3 / 10.0
EPSS (Exploit Probability)
0.1%
31th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fastgpt