Description
A vulnerability has been found in TransformerOptimus SuperAGI up to 0.0.14. This affects the function delete_api_key/edit_api_key of the file superagi/controllers/api_key.py of the component API Key Management Endpoint. The manipulation leads to authorization bypass. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-19
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Authorization Bypass
Action: Patch
AI Analysis

Impact

The vulnerability exists in SuperAGI’s API Key Management Endpoint, specifically the delete_api_key and edit_api_key functions. It permits attackers to bypass authorization controls, allowing them to delete or modify API keys without the required privileges. Remote access to these endpoints provides an opportunity for an attacker to alter key settings or create unauthorized keys, compromising system integrity and exposing services to abuse.

Affected Systems

TransformerOptimus SuperAGI versions up to and including 0.0.14 are affected. The flaw targets the API Key Management component located in superagi/controllers/api_key.py. Any installation of SuperAGI that exposes these endpoints to external networks is susceptible, regardless of operating platform.

Risk and Exploitability

The CVSS base score is 5.3, indicating moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, meaning no current evidence of active exploitation. Nonetheless, because the issue is remotely exploitable and publicly disclosed, attackers with network reach could potentially gain unauthorized API key control. The lack of KEV status does not eliminate future exploitation risk, particularly given the straightforward authorization bypass.

Generated by OpenCVE AI on April 20, 2026 at 00:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SuperAGI to version 0.0.15 or newer, where the authorization checks for key deletion and modification have been fixed.
  • Enforce strict role‑based access control for the API key management endpoints so that only administrators can invoke delete or edit operations.
  • If an immediate upgrade is not possible, monitor all API key activity logs for anomalous changes and consider disabling edit/delete functionality until a patch is applied.

Generated by OpenCVE AI on April 20, 2026 at 00:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 19 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in TransformerOptimus SuperAGI up to 0.0.14. This affects the function delete_api_key/edit_api_key of the file superagi/controllers/api_key.py of the component API Key Management Endpoint. The manipulation leads to authorization bypass. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title TransformerOptimus SuperAGI API Key Management Endpoint api_key.py edit_api_key authorization
First Time appeared Superagi
Superagi superagi
Weaknesses CWE-285
CWE-639
CPEs cpe:2.3:a:superagi:superagi:*:*:*:*:*:*:*:*
Vendors & Products Superagi
Superagi superagi
References
Metrics cvssV2_0

{'score': 5.5, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Superagi Superagi
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-19T23:00:20.450Z

Reserved: 2026-04-19T05:40:52.536Z

Link: CVE-2026-6583

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-19T23:16:34.300

Modified: 2026-04-19T23:16:34.300

Link: CVE-2026-6583

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T00:30:27Z

Weaknesses