Description
A vulnerability was determined in TransformerOptimus SuperAGI up to 0.0.14. This impacts the function get_agent_execution/update_agent_execution of the file superagi/controllers/agent_execution.py of the component Agent Execution Endpoint. Executing a manipulation of the argument agent_execution_id can lead to authorization bypass. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass via Agent Execution Endpoint
Action: Apply Patch
AI Analysis

Impact

A flaw in the Agent Execution Endpoint of TransformerOptimus SuperAGI allows an attacker to manipulate the agent_execution_id argument, bypassing authentication checks. This vulnerability can be exploited remotely and grants the attacker unauthorized execution of agent commands. The weakness corresponds to improper access control (CWE‑285) and improper handling of user assertions (CWE‑639).

Affected Systems

TransformerOptimus SuperAGI versions up to and including 0.0.14 are affected. The flaw resides in superagi/controllers/agent_execution.py and impacts only the get_agent_execution and update_agent_execution functionality.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that exploitation probability is not confirmed. The attacker can reach the affected function over the network; due to the lack of proper authorization checks, the attack does not require privileged credentials once the endpoint is reachable.

Generated by OpenCVE AI on April 20, 2026 at 08:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest SuperAGI release that addresses the agent_execution_id authorization flaw
  • Where an update is unavailable, limit exposure of the Agent Execution Endpoint using network segmentation or firewall rules so only trusted internal hosts can reach it
  • Verify that all requests to get_agent_execution and update_agent_execution are authenticated and subject to proper authorization checks before processing

Generated by OpenCVE AI on April 20, 2026 at 08:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in TransformerOptimus SuperAGI up to 0.0.14. This impacts the function get_agent_execution/update_agent_execution of the file superagi/controllers/agent_execution.py of the component Agent Execution Endpoint. Executing a manipulation of the argument agent_execution_id can lead to authorization bypass. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title TransformerOptimus SuperAGI Agent Execution Endpoint agent_execution.py update_agent_execution authorization
First Time appeared Superagi
Superagi superagi
Weaknesses CWE-285
CWE-639
CPEs cpe:2.3:a:superagi:superagi:*:*:*:*:*:*:*:*
Vendors & Products Superagi
Superagi superagi
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Superagi Superagi
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T11:24:09.255Z

Reserved: 2026-04-19T16:13:28.362Z

Link: CVE-2026-6612

cve-icon Vulnrichment

Updated: 2026-04-20T11:24:03.628Z

cve-icon NVD

Status : Received

Published: 2026-04-20T07:16:15.943

Modified: 2026-04-20T07:16:15.943

Link: CVE-2026-6612

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T09:00:03Z

Weaknesses