CVE-2026-34163 - Vulnerability Analysis
HighCVSS: 7.7Last Updated: April 1, 2026
FastGPT - Server Side Request Forgery
Overview
FastGPT < 4.14.9.5 contains a server side request forgery caused by lack of internal address validation in MCP tools endpoints, letting authenticated attackers scan internal networks and access internal services.
Severity & Score
Impact
Authenticated attackers can scan internal networks and access sensitive internal services, potentially leading to data exposure or further compromise.
Mitigation
Upgrade to version 4.14.9.5 or later.
References
Social Media Activity(1 post)
š CVE-2026-34163 - High (7.7) FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and /api/core/app/mcpTools/runTool) accept a user-supplied URL parameter and make server-s... š https://www.thehackerwire.com/vulnerability/CVE-2026-34163/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-34163
- Severity
- High
- CVSS Score
- 7.7
- Type
- server_side_request_forgery
- Status
- confirmed
- EPSS
- 2.8%
- Social Posts
- 1
CWE
- CWE-918
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N