CVE-2025-52552
Analyzed Analyzed - Analysis Complete
BaseFortify

Publication date: 2025-06-21

Last updated on: 2025-12-29

Assigner: GitHub, Inc.

Description
FastGPT is an AI Agent building platform. Prior to version 4.9.12, the LastRoute Parameter on login page is vulnerable to open redirect and DOM-based XSS. Improper validation and lack of sanitization of this parameter allows attackers execute malicious JavaScript or redirect them to attacker-controlled sites. This issue has been patched in version 4.9.12.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-21
Last Modified
2025-12-29
Generated
2026-05-07
AI Q&A
2025-06-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fastgpt fastgpt to 4.9.12 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the FastGPT AI Agent building platform versions prior to 4.9.12. It involves the 'LastRoute' parameter on the login page, which is vulnerable to open redirect and DOM-based Cross-Site Scripting (XSS). Due to improper validation and lack of sanitization of this parameter, attackers can either redirect users to malicious websites or execute malicious JavaScript code within the victim's browser. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to redirect users to attacker-controlled malicious sites, potentially leading to phishing or malware distribution. Additionally, attackers can execute arbitrary JavaScript in the context of your users' browsers, which can lead to theft of sensitive information, session hijacking, or other malicious actions. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by testing the 'LastRoute' parameter on the login page for open redirect and DOM-based XSS issues. For example, you can use curl or similar tools to send requests with malicious payloads in the 'LastRoute' parameter and observe the response or behavior. A sample command to test open redirect might be: curl -v 'https://your-fastgpt-instance/login?LastRoute=https://evil.com'. For DOM-based XSS, you can inject JavaScript payloads in the 'LastRoute' parameter and check if they execute in the browser context. Automated security scanners or manual penetration testing focusing on this parameter can help detect the vulnerability. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade the fastgpt package to version 4.9.12 or later, where the issue with the 'LastRoute' parameter has been patched. Additionally, you should validate and sanitize the 'LastRoute' parameter to prevent open redirects and DOM-based XSS attacks if upgrading is not immediately possible. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart