Description
A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific commands, such as 'whoami' and '/bin/whoami'. An attacker can circumvent this restriction by executing commands with a modified path, such as '/bin/./whoami', which is not recognized by the denylist.
References (2)
Core 2
Core References
Patch
https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed
Exploit, Third Party Advisory
https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050
Scores
CVSS v3
9.8
EPSS
0.0018
EPSS Percentile
38.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (2)
agpt/autogpt_classic
0.5.1
pypi/agpt
0PyPI
Published
Sep 11, 2024
Tracked Since
Feb 18, 2026