Impact
This vulnerability allows an authenticated user to execute arbitrary Python code on the AutoGPT backend by embedding a BlockInstallationBlock, a development tool that can write and import arbitrary code, inside a workflow graph. The block is intended to be disabled, but graph validation does not enforce this flag, enabling the user to bypass the intended restriction. The flaw is an improper authorization weakness (CWE‑285), providing full control over the server where AutoGPT runs.
Affected Systems
Any installation of Significant‑Gravitas AutoGPT prior to version 0.6.48 is affected. The issue was fixed in release 0.6.48; further releases include the patch.
Risk and Exploitability
The CVSS score of 9.4 indicates a critical impact, while the EPSS score of less than 1% suggests that active exploitation has not been widely observed, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an authenticated user with permissions to create or modify workflow graphs; such a user can embed the vulnerable block and immediately gain code execution capabilities on the backend server.
OpenCVE Enrichment