CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-49131: FastGPT Sandbox Vulnerable to Sandbox Bypass

6.3 CVSS

Description

FastGPT is an open-source project that provides a platform for building, deploying, and operating AI-driven workflows and conversational agents. The Sandbox container (fastgpt-sandbox) is a specialized, isolated environment used by FastGPT to safely execute user-submitted or dynamically generated code in isolation. The sandbox before version 4.9.11 has insufficient isolation and inadequate restrictions on code execution by allowing overly permissive syscalls, which allows attackers to escape the intended sandbox boundaries. Attackers could exploit this to read and overwrite arbitrary files and bypass Python module import restrictions. This is patched in version 4.9.11 by restricting the allowed system calls to a safer subset and additional descriptive error messaging.

Classification

CVE ID: CVE-2025-49131

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.3

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem Types

CWE-732: Incorrect Permission Assignment for Critical Resource

Affected Products

Vendor: labring

Product: FastGPT

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 17.53% (scored less or equal to compared to others)

EPSS Date: 2025-06-23 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-49131
https://github.com/labring/FastGPT/security/advisories/GHSA-f3pf-r3g7-g895
https://github.com/labring/FastGPT/pull/4958
https://github.com/labring/FastGPT/commit/bb810a43a1c70683fab7f5fe993771e930a94426
https://github.com/labring/FastGPT/pkgs/container/fastgpt-sandbox
https://github.com/labring/FastGPT/releases/tag/v4.9.11

Timeline