Impact
A flaw in the SuperAGI Budget Endpoint of TransformerOptimus SuperAGI versions up to 0.0.14 permits attackers to interfere with the get_budget and update_budget actions in budget.py without proper authorization. The bug is an authorization bypass (CWE-285) that can be triggered by manipulating user input (CWE-639). Successfully exploited, the vulnerability lets an attacker read or modify budget information, potentially defrauding or causing financial mismanagement.
Affected Systems
Affected are all instances of TransformerOptimus SuperAGI up to version 0.0.14 that deploy the superagi component. The vulnerability resides in the budget.py controller within the superagi/controllers/budget directory. Endpoints exposed for budgeting functions are the target; any deployment of the vulnerable version is susceptible.
Risk and Exploitability
The CVSS base score is 5.3, indicating moderate severity. EPSS is not available, but the exploit is publicly available and could be used for remote attacks. The vulnerability is not listed in the KEV catalog. Attackers can target it remotely, likely by sending crafted requests to the budget endpoint. No vendor patch is currently available, and the vendor has not responded to disclosure, so the risk remains until a fix is applied.
OpenCVE Enrichment