Description
A weakness has been identified in TransformerOptimus SuperAGI up to 0.0.14. Affected by this issue is the function Upload of the file superagi/controllers/resources.py of the component Multipart Upload Handler. This manipulation of the argument Name causes path traversal. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Path Traversal via Multipart Upload
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a path traversal flaw (CWE‑22) located in the Upload routine of transformeroptimus superagi's Multipart Upload Handler. By manipulating the Name argument during a file upload, an attacker can direct the server to write a file outside the intended upload directory. This can expose the system to arbitrary file creation or overwrite of system files, potentially allowing further compromise or persistence.

Affected Systems

TransformerOptimus SuperAGI releases up to 0.0.14 are affected; any remaining releases until the fix is deployed remain at risk.

Risk and Exploitability

The CVSS score of 6.9 classifies the issue as moderate severity. The EPSS score is not available, so current exploitation likelihood is unknown, yet the description confirms that a public exploit script exists. The vulnerability can be triggered via the remote Multipart Upload API, meaning any attacker who can reach that endpoint can exploit the flaw even without local privileges.

Generated by OpenCVE AI on April 20, 2026 at 08:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SuperAGI to a version later than 0.0.14 that addresses the path traversal flaw.
  • Restrict access to the multipart upload endpoint so that only authenticated or trusted clients can use it, for example via IP filtering or application‑level authentication.
  • Validate and sanitize the file name argument before writing to disk, ensuring that no directory separators or traversal sequences are present, or use a whitelist of allowed characters.

Generated by OpenCVE AI on April 20, 2026 at 08:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Transformeroptimus
Transformeroptimus superagi
Vendors & Products Transformeroptimus
Transformeroptimus superagi

Mon, 20 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in TransformerOptimus SuperAGI up to 0.0.14. Affected by this issue is the function Upload of the file superagi/controllers/resources.py of the component Multipart Upload Handler. This manipulation of the argument Name causes path traversal. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title TransformerOptimus SuperAGI Multipart Upload resources.py upload path traversal
First Time appeared Superagi
Superagi superagi
Weaknesses CWE-22
CPEs cpe:2.3:a:superagi:superagi:*:*:*:*:*:*:*:*
Vendors & Products Superagi
Superagi superagi
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Superagi Superagi
Transformeroptimus Superagi
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T15:56:36.960Z

Reserved: 2026-04-19T16:13:38.662Z

Link: CVE-2026-6615

cve-icon Vulnrichment

Updated: 2026-04-20T15:56:25.524Z

cve-icon NVD

Status : Received

Published: 2026-04-20T08:16:11.190

Modified: 2026-04-20T08:16:11.190

Link: CVE-2026-6615

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:58:04Z

Weaknesses