Description
All versions of `SuperAGI` are vulnerable to Arbitrary Code Execution due to unsafe use of the ‘eval’ function. An attacker could induce the LLM output to exploit this vulnerability and gain arbitrary code execution on the SuperAGI application server.
Published: 2024-07-22
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-19201 All versions of `SuperAGI` are vulnerable to Arbitrary Code Execution due to unsafe use of the ‘eval’ function. An attacker could induce the LLM output to exploit this vulnerability and gain arbitrary code execution on the SuperAGI application server.
History

No history.

Subscriptions

Superagi Superagi
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-01T22:27:34.853Z

Reserved: 2023-12-22T12:33:20.128Z

Link: CVE-2024-21552

cve-icon Vulnrichment

Updated: 2024-08-01T22:27:34.853Z

cve-icon NVD

Status : Deferred

Published: 2024-07-22T15:15:02.410

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-21552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T15:42:24Z

Weaknesses