CVE-2026-2975

5.3 MEDIUM

📋 TL;DR

FastApiAdmin up to version 2.2.0 contains an information disclosure vulnerability in the reset_api_docs function of the custom documentation endpoint. This allows remote attackers to access sensitive information without authentication. All deployments using vulnerable versions are affected.

💻 Affected Systems

Products:
  • FastApiAdmin
Versions: up to 2.2.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the custom documentation endpoint component specifically. All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive configuration data, API keys, database credentials, or other secrets stored in the application, leading to complete system compromise.

🟠

Likely Case

Exposure of internal API documentation, configuration details, or limited sensitive information that could facilitate further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to information within the FastApiAdmin component only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires no authentication. Simple HTTP requests can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.1 or later

Vendor Advisory: https://github.com/fastapi-admin/fastapi-admin

Restart Required: Yes

Instructions:

1. Update FastApiAdmin to version 2.2.1 or later using pip: pip install --upgrade fastapi-admin>=2.2.1
2. Restart the FastAPI application
3. Verify the custom documentation endpoint is no longer accessible or properly secured

🔧 Temporary Workarounds

Disable custom documentation endpoint

all

Remove or disable the vulnerable custom documentation endpoint component

Modify /backend/app/plugin/init_app.py to remove or comment out the reset_api_docs function and related endpoints

Network access restriction

linux

Restrict access to the FastAPI admin interface using firewall rules

iptables -A INPUT -p tcp --dport [FASTAPI_PORT] -s [TRUSTED_IPS] -j ACCEPT
iptables -A INPUT -p tcp --dport [FASTAPI_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FastApiAdmin from untrusted networks
  • Deploy a web application firewall (WAF) with rules to block requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check if FastApiAdmin version is 2.2.0 or earlier and if the custom documentation endpoint is accessible via HTTP requests

Check Version:

pip show fastapi-admin | grep Version

Verify Fix Applied:

After updating, attempt to access the custom documentation endpoint and verify it returns proper authentication errors or is disabled

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /backend/app/plugin/init_app.py or custom documentation endpoints
  • Unusual access patterns to admin interfaces

Network Indicators:

  • HTTP GET/POST requests to documentation endpoints from untrusted sources
  • Traffic spikes to admin interfaces

SIEM Query:

source="web_logs" AND (uri="/backend/app/plugin/init_app.py" OR uri CONTAINS "api_docs")

🔗 References

📤 Share & Export