CVE-2025-49131
BaseFortify
Publication date: 2025-06-09
Last updated on: 2025-12-29
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fastgpt | fastgpt | to 4.9.11 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the FastGPT project's Python sandbox environment used to safely execute user-submitted or dynamically generated code. Before version 4.9.11, the sandbox had insufficient isolation and overly permissive system call restrictions, allowing attackers to escape the sandbox boundaries. Specifically, attackers could read and overwrite arbitrary files on the host system and bypass Python module import restrictions by exploiting allowed syscalls and dynamic import methods. This could lead to unauthorized access and modification of files and execution of restricted code. [2]
How can this vulnerability impact me? :
An attacker with low privileges and no user interaction can exploit this vulnerability to read sensitive files (like /etc/passwd), overwrite arbitrary files with root privileges potentially causing denial of service, and bypass module import restrictions to execute unauthorized code. This can lead to system compromise, data leakage, and service disruption. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the version of the FastGPT sandbox container in use. Versions prior to 4.9.11 are vulnerable. You can verify the version of the FastGPT sandbox container by running commands such as `docker images | grep fastgpt-sandbox` or checking the version tag in your deployment configuration. Additionally, monitoring for unusual file read/write operations or unexpected Python module imports in the sandbox environment may indicate exploitation attempts. Specific commands to detect exploitation attempts are not provided in the resources. [2, 3]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade the FastGPT sandbox container to version 4.9.11 or later, which includes a patch restricting allowed system calls to a safer subset and improves sandbox security. According to the release notes, you should back up your data, then update the FastGPT and FastGPT commercial version Docker image tags to v4.9.11, and update the Sandbox image tag to v4.9.11. No updates are required for mcp_server and AIProxy. This upgrade addresses the insufficient isolation and syscall restrictions that allow sandbox escape. [2, 3]