Impact
The SuperAGI update_organisation endpoint allows an attacker to supply an arbitrary organisation_id and modify organisational data, bypassing all authorization checks. This flaw permits an unauthenticated or minimally privileged user to alter or delete resources belonging to any organization, potentially leading to data tampering, unauthorized access, and privilege escalation.
Affected Systems
Products impacted are TransformerOptimus SuperAGI for all versions up to and including 0.0.14, specifically the superagi/controllers/organisation.py module which contains the update_organisation endpoint. Deployments running any version in this range are vulnerable.
Risk and Exploitability
The CVSS score of 5.3 classifies this as moderate severity. Exploitation can be performed remotely by sending a crafted HTTP request to the update_organisation API, manipulating the organisation_id parameter. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating a moderate risk of exploitation but no current evidence of widespread active attacks.
OpenCVE Enrichment