Impact
AutoGPT’s platform records execution output to console stdout/stderr and Docker captures this as container logs. Before version 0.6.32 the logging configuration imposes no limit on the accumulated log size. As a result, repeated or large user interactions can cause the log files to grow unchecked, exhausting the host disk and leading to a denial of service. The weakness is a resource exhaustion flaw classified as CWE-770.
Affected Systems
The affected product is Significant‑Gravitas AutoGPT, specifically any deployment of AutoGPT prior to the release of version 0.6.32. Upgrades to 0.6.32 or later incorporate log rotation limits that mitigate the vulnerability.
Risk and Exploitability
With a CVSS score of 5.1 the vulnerability is considered moderate. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, indicating no known active exploitation at this time. The likely attack vector is an attacker or an automated process that generates many requests or long‑running tasks, causing the logs to grow and consume disk space until the host becomes unavailable. Deployment in a containerized environment without any other protective controls makes this vulnerability straightforward to trigger.
OpenCVE Enrichment