Impact
A flaw in the Agent Execution Endpoint of TransformerOptimus SuperAGI allows an attacker to manipulate the agent_execution_id argument, bypassing authentication checks. This vulnerability can be exploited remotely and grants the attacker unauthorized execution of agent commands. The weakness corresponds to improper access control (CWE‑285) and improper handling of user assertions (CWE‑639).
Affected Systems
TransformerOptimus SuperAGI versions up to and including 0.0.14 are affected. The flaw resides in superagi/controllers/agent_execution.py and impacts only the get_agent_execution and update_agent_execution functionality.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that exploitation probability is not confirmed. The attacker can reach the affected function over the network; due to the lack of proper authorization checks, the attack does not require privileged credentials once the endpoint is reachable.
OpenCVE Enrichment