Description
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. The autogpt before 0.6.32 is vulnerable to Regular Expression Denial of Service due to the use of regex at Code Extraction Block. The two Regex are used containing the corresponding dangerous patterns \s+[\s\S]*? and \s+(.*?). They share a common characteristic — the combination of two adjacent quantifiers that can match the same space character (\s). As a result, an attacker can supply a long sequence of space characters to trigger excessive regex backtracking, potentially leading to a Denial of Service (DoS). This vulnerability is fixed in 0.6.32.
Published: 2026-02-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability involves an unsafe regular expression used in the code extraction block of the AutoGPT platform, which can trigger catastrophic backtracking when presented with a long string of whitespace characters. Because the regex patterns contain adjacent quantifiers that match the same whitespace, an attacker can craft input that causes the engine to spend excessive CPU time to evaluate the match, leading to a denial of service. The weakness corresponds to CWE‑1333, a denial‑of‑service risk due to inefficient regex.

Affected Systems

The affected product is Significant‑Gravitas AutoGPT platform. All releases prior to 0.6.32 are vulnerable; the fix is included in 0.6.32 and later releases. The vulnerability exists in the code extraction block of the backend, which is part of the autogpt_platform repository.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity; the EPSS score of less than 1 percent signals that the likelihood of exploitation is currently low. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to supply a specially crafted input containing a very long sequence of spaces to the code extraction block. Once triggered, the regex performs excessive backtracking, consuming CPU resources and resulting in a temporary denial of service. Because the affected component is accessed by any user able to provide input to the code extraction feature, the attack vector is likely remote but could also be local to a privileged user.

Generated by OpenCVE AI on April 17, 2026 at 20:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AutoGPT to version 0.6.32 or later.
  • Limit or validate input to the code extraction block, rejecting excessively long sequences of whitespace.
  • Monitor CPU usage and temporarily block or rate‑limit users that trigger repeated regex back‑tracking to prevent resource exhaustion.

Generated by OpenCVE AI on April 17, 2026 at 20:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Agpt
Agpt autogpt Platform
CPEs cpe:2.3:a:agpt:autogpt_platform:*:*:*:*:*:*:*:*
Vendors & Products Agpt
Agpt autogpt Platform

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Significant-gravitas
Significant-gravitas autogpt
Vendors & Products Significant-gravitas
Significant-gravitas autogpt
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. The autogpt before 0.6.32 is vulnerable to Regular Expression Denial of Service due to the use of regex at Code Extraction Block. The two Regex are used containing the corresponding dangerous patterns \s+[\s\S]*? and \s+(.*?). They share a common characteristic — the combination of two adjacent quantifiers that can match the same space character (\s). As a result, an attacker can supply a long sequence of space characters to trigger excessive regex backtracking, potentially leading to a Denial of Service (DoS). This vulnerability is fixed in 0.6.32.
Title Redos (Regular Expression Denial of Service) at Code Extraction Block in significant-gravitas/autogpt
Weaknesses CWE-1333
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Agpt Autogpt Platform
Significant-gravitas Autogpt
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-11T21:27:22.085Z

Reserved: 2026-02-09T17:41:55.860Z

Link: CVE-2026-26006

cve-icon Vulnrichment

Updated: 2026-02-11T21:27:19.629Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T22:16:59.710

Modified: 2026-02-17T15:28:04.533

Link: CVE-2026-26006

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:30:15Z

Weaknesses