CVE-2025-52552
BaseFortify
Publication date: 2025-06-21
Last updated on: 2025-12-29
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fastgpt | fastgpt | to 4.9.12 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the FastGPT AI Agent building platform versions prior to 4.9.12. It involves the 'LastRoute' parameter on the login page, which is vulnerable to open redirect and DOM-based Cross-Site Scripting (XSS). Due to improper validation and lack of sanitization of this parameter, attackers can either redirect users to malicious websites or execute malicious JavaScript code within the victim's browser. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to redirect users to attacker-controlled malicious sites, potentially leading to phishing or malware distribution. Additionally, attackers can execute arbitrary JavaScript in the context of your users' browsers, which can lead to theft of sensitive information, session hijacking, or other malicious actions. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by testing the 'LastRoute' parameter on the login page for open redirect and DOM-based XSS issues. For example, you can use curl or similar tools to send requests with malicious payloads in the 'LastRoute' parameter and observe the response or behavior. A sample command to test open redirect might be: curl -v 'https://your-fastgpt-instance/login?LastRoute=https://evil.com'. For DOM-based XSS, you can inject JavaScript payloads in the 'LastRoute' parameter and check if they execute in the browser context. Automated security scanners or manual penetration testing focusing on this parameter can help detect the vulnerability. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade the fastgpt package to version 4.9.12 or later, where the issue with the 'LastRoute' parameter has been patched. Additionally, you should validate and sanitize the 'LastRoute' parameter to prevent open redirects and DOM-based XSS attacks if upgrading is not immediately possible. [1]