Description
AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. Versions 0.4.2 through 0.6.51 are vulnerable to an unauthenticated Denial of Service (DoS) through the server due to uncontrolled disk space consumption. The download_agent_file endpoint creates persistent temporary files for every request but fails to delete them after they are served. An unauthenticated attacker can repeatedly call this endpoint to exhaust the server's disk space, causing
the database or other system services to fail due to "No space left on device" errors, rendering the entire AutoGPT Platform backend unavailable to all users. This issue has been patched in version 0.6.52.
Published: 2026-05-19
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

AutoGPT versions 0.4.2 through 0.6.51 create a persistent temporary file for each request to the download_agent_file endpoint and never delete it. An attacker without authentication can repeatedly call this endpoint, causing the server's disk to fill and triggering "No space left on device" errors that affect the database and other services, effectively shutting down the AutoGPT Platform backend for all users. The weakness belongs to CWE‑400 (Uncontrolled Resource Consumption), CWE‑459 (Missing Release of Old File), and CWE‑770 (Out of Resource Exceeded).

Affected Systems

The affected vendor is Significant‑Gravitas, product AutoGPT, with all releases from 0.4.2 up to 0.6.51 vulnerable. The issue was addressed in version 0.6.52 and should be used to resolve the vulnerability.

Risk and Exploitability

With a CVSS score of 7.5 this vulnerability is considered high severity, although no EPSS score is available; it is not listed in the CISA KEV catalog. The attack vector is an unauthenticated external request to a public endpoint, making exploitation trivial for any attacker who can reach the service. Once exercised, the DoS effect can render the entire backend unavailable, impacting availability for all users.

Generated by OpenCVE AI on May 19, 2026 at 02:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Major Changes or patch the AutoGPT Platform to version 0.6.52 or later.
  • If immediate upgrade is not possible, limit the rate of requests to the download_agent_file endpoint or firewall it for unauthenticated traffic.
  • Configure the operating system to monitor disk usage and trigger alerts before the device reaches full capacity.

Generated by OpenCVE AI on May 19, 2026 at 02:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 03:45:00 +0000

Type Values Removed Values Added
First Time appeared Significant-gravitas
Significant-gravitas autogpt
Vendors & Products Significant-gravitas
Significant-gravitas autogpt

Tue, 19 May 2026 01:30:00 +0000

Type Values Removed Values Added
Description AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. Versions 0.4.2 through 0.6.51 are vulnerable to an unauthenticated Denial of Service (DoS) through the server due to uncontrolled disk space consumption. The download_agent_file endpoint creates persistent temporary files for every request but fails to delete them after they are served. An unauthenticated attacker can repeatedly call this endpoint to exhaust the server's disk space, causing the database or other system services to fail due to "No space left on device" errors, rendering the entire AutoGPT Platform backend unavailable to all users. This issue has been patched in version 0.6.52.
Title AutoGPT: Unauthenticated DoS via Disk Space Exhaustion
Weaknesses CWE-400
CWE-459
CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Significant-gravitas Autogpt
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-19T00:35:50.667Z

Reserved: 2026-03-18T02:42:27.507Z

Link: CVE-2026-33232

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-19T02:16:15.677

Modified: 2026-05-19T02:16:15.677

Link: CVE-2026-33232

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T03:30:35Z

Weaknesses