All versions of `SuperAGI` are vulnerable to Arbitrary Code Execution due to unsafe use of the ‘eval’ function. An attacker could induce the LLM output to exploit this vulnerability and gain arbitrary code execution on the SuperAGI application server.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-19201 All versions of `SuperAGI` are vulnerable to Arbitrary Code Execution due to unsafe use of the ‘eval’ function. An attacker could induce the LLM output to exploit this vulnerability and gain arbitrary code execution on the SuperAGI application server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-01T22:27:34.853Z

Reserved: 2023-12-22T12:33:20.128Z

Link: CVE-2024-21552

cve-icon Vulnrichment

Updated: 2024-08-01T22:27:34.853Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-22T15:15:02.410

Modified: 2024-11-21T08:54:39.323

Link: CVE-2024-21552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T15:42:24Z