Impact
A flaw in TransformerOptimus SuperAGI inside superagi/controllers/agent.py allows manipulation of the agent_id parameter in the delete_agent, stop_schedule, and get_schedule_data endpoints. Because the request does not correctly verify that the caller owns or is authorized for the specified agent, an authenticated user can delete, halt, or read the schedule of an arbitrary agent. This breach of authorization control (CWE‑285 and CWE‑639) permits the attacker to gain unauthorized operational and informational capabilities.
Affected Systems
All releases of TransformerOptimus SuperAGI up to and including version 0.0.14 are affected. The vulnerability involves the agent.py controller and impacts any instance that exposes the delete_agent, stop_schedule, or get_schedule_data APIs to untrusted clients.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score is not available. Because the attack vector is remote and an exploit has been published, the risk to exposed installations remains significant. The vulnerability is not listed in CISA's KEV catalog, but lack of vendor response leaves users without an official fix until a patch or advisory is released. Until then, offending calls can alter agent state or leak scheduling data for agents not owned by the attacker.
OpenCVE Enrichment