Description
A security flaw has been discovered in TransformerOptimus SuperAGI up to 0.0.14. Affected by this vulnerability is the function get_project/update_project/get_projects_organisation of the file superagi/controllers/project.py. The manipulation results in authorization bypass. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Assess Impact
AI Analysis

Impact

The vulnerability is an authorization bypass in the SuperAGI controller functions get_project, update_project, and get_projects_organisation, allowing unauthenticated or improperly authorized users to view or modify any project. The flaw is caused by insufficient verification of user permissions, as indicated by CWE-285 and CWE-639. Attackers can retrieve or change project data without following the intended access controls, potentially exposing confidential project information and enabling further malicious actions.

Affected Systems

Affected by this flaw are installations of TransformerOptimus SuperAGI up to version 0.0.14. Any deployment that has not upgraded beyond this version and that exposes the /project endpoints can be impacted. The vulnerability exists in the superagi/controllers/project.py module.

Risk and Exploitability

The CVSS score of 5.3 reflects medium severity. EPSS is not available, so the exact likelihood of exploitation remains unknown. The vulnerability is not listed in the CISA KEV catalog, but the public release of the exploit suggests that attackers can target affected systems remotely. Because the flaw bypasses authorization checks, it can be exploited with only network access to the API and minimal credentials, making it a significant risk for any organization running the vulnerable version.

Generated by OpenCVE AI on April 20, 2026 at 08:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a SuperAGI version newer than 0.0.14 once the vendor releases a patch that addresses the authorization checks in the project controller.
  • Apply role‑based access controls or IP whitelisting to restrict access to the /project endpoints until a patch is available.
  • Enable extensive logging of project access attempts and review logs for unauthorized activity.

Generated by OpenCVE AI on April 20, 2026 at 08:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in TransformerOptimus SuperAGI up to 0.0.14. Affected by this vulnerability is the function get_project/update_project/get_projects_organisation of the file superagi/controllers/project.py. The manipulation results in authorization bypass. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title TransformerOptimus SuperAGI project.py get_projects_organisation authorization
First Time appeared Superagi
Superagi superagi
Weaknesses CWE-285
CWE-639
CPEs cpe:2.3:a:superagi:superagi:*:*:*:*:*:*:*:*
Vendors & Products Superagi
Superagi superagi
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Superagi Superagi
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T13:51:06.467Z

Reserved: 2026-04-19T16:13:35.375Z

Link: CVE-2026-6614

cve-icon Vulnrichment

Updated: 2026-04-20T13:51:02.375Z

cve-icon NVD

Status : Received

Published: 2026-04-20T07:16:16.343

Modified: 2026-04-20T07:16:16.343

Link: CVE-2026-6614

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T09:00:02Z

Weaknesses