Impact
AutoGPT versions 0.4.2 through 0.6.51 create a persistent temporary file for each request to the download_agent_file endpoint and never delete it. An attacker without authentication can repeatedly call this endpoint, causing the server's disk to fill and triggering "No space left on device" errors that affect the database and other services, effectively shutting down the AutoGPT Platform backend for all users. The weakness belongs to CWE‑400 (Uncontrolled Resource Consumption), CWE‑459 (Missing Release of Old File), and CWE‑770 (Out of Resource Exceeded).
Affected Systems
The affected vendor is Significant‑Gravitas, product AutoGPT, with all releases from 0.4.2 up to 0.6.51 vulnerable. The issue was addressed in version 0.6.52 and should be used to resolve the vulnerability.
Risk and Exploitability
With a CVSS score of 7.5 this vulnerability is considered high severity, although no EPSS score is available; it is not listed in the CISA KEV catalog. The attack vector is an unauthenticated external request to a public endpoint, making exploitation trivial for any attacker who can reach the service. Once exercised, the DoS effect can render the entire backend unavailable, impacting availability for all users.
OpenCVE Enrichment