Impact
Prior to autogpt-platform-beta-v0.6.46, three Stagehand integration blocks in AutoGPT logged API keys and authentication secrets in plaintext using logger.info() statements, exposing credentials that belong to the user. This vulnerability is classified as CWE-532, a type of information leakage whereby sensitive data can be read from logs. An attacker who can read the log files would gain access to these secrets, potentially allowing unauthorized use of external services, data exfiltration, or further compromise of the user’s environment.
Affected Systems
This issue affects the AutoGPT platform released by Significant‑Gravitas prior to version autogpt-platform-beta‑v0.6.46. The affected components are the StagehandObserveBlock, StagehandActBlock, and StagehandExtractBlock within the AutoGPT codebase.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.1, indicating high severity, yet the EPSS score is <1% and it is not listed in the CISA KEV catalog, suggesting that exploitation is unlikely. Likely attack vectors are local, involving access to the system’s log files or a misconfigured logging service that persists logs on a shared or insecure medium.
OpenCVE Enrichment