Description
A Cross-Site Request Forgery (CSRF) vulnerability in significant-gravitas/autogpt version v0.5.0 allows attackers to execute arbitrary commands on the AutoGPT server. The vulnerability stems from the lack of protections on the API endpoint receiving instructions, enabling an attacker to direct a user running AutoGPT in their local network to a malicious website. This site can then send crafted requests to the AutoGPT server, leading to command execution. The issue is exacerbated by CORS being enabled for arbitrary origins by default, allowing the attacker to read the response of all cross-site queries. This vulnerability was addressed in version 5.1.
References (2)
Core 2
Core References
Patch
https://github.com/significant-gravitas/autogpt/commit/26324f29849967fa72c207da929af612f1740669
Exploit, Third Party Advisory
https://huntr.com/bounties/125c2d0c-0481-4e5c-ae90-fec263acdf32
Scores
CVSS v3
8.8
EPSS
0.0040
EPSS Percentile
60.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-352
Status
published
Products (1)
agpt/autogpt_classic
0.5.0
Published
Jun 06, 2024
Tracked Since
Feb 18, 2026