Description

FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fastgpt-preview-image.yml workflow is vulnerable to arbitrary code execution and secret exfiltration by any external contributor. It uses pull_request_target (which runs with access to repository secrets) but checks out code from the pull request author's fork, then builds and pushes Docker images using attacker-controlled Dockerfiles. This also enables a supply chain attack via the production container registry. A patch was not available at the time of publication.

INFO

Published Date :

2026-03-20T08:37:16.169Z

Last Modified :

2026-03-20T08:37:16.169Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33075 vulnerability.

Vendors Products
Labring
  • Fastgpt
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33075.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability