Description
A security vulnerability has been detected in TransformerOptimus SuperAGI up to 0.0.14. This affects the function extract_with_bs4/extract_with_3k/extract_with_lxml of the file superagi/helper/webpage_extractor.py of the component WebScraperTool. Such manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

The vulnerability originates in the extract_with_bs4, extract_with_3k, and extract_with_lxml functions of the WebScraperTool component. User‑provided URLs are processed without proper validation, allowing an attacker to supply arbitrary URLs that the server will request. This results in a server‑side request forgery, which can expose internal resources, leak data, or enable further attacks. The weakness is identified as CWE‑918.

Affected Systems

TransformerOptimus SuperAGI versions up to and including 0.0.14 are affected. No other products or versions are listed.

Risk and Exploitability

The vulnerability has a CVSS score of 5.3, indicating moderate severity. No EPSS information is available and the issue is not currently listed in the CISA KEV catalog, suggesting that it has not yet been broadly exploited in the wild. However, remote exploitation is possible and an exploit has been publicly disclosed, implying that attackers could target vulnerable deployments from outside the network. Because the vulnerability is an SSRF, the attacker’s ability to impact the system depends on the internal network topology and the services accessed by the SSRF.

Generated by OpenCVE AI on April 20, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the application to a fixed version (e.g., 0.0.15 or later when released).
  • If an upgrade is not immediately available, restrict the URLs that can be fetched by the WebScraperTool to a trusted whitelist, or disable the extract_with_lxml function entirely.
  • Implement network segmentation or firewall rules to block the Scraper tool from accessing sensitive internal IP ranges, thereby mitigating the impact of any residual SSRF.

Generated by OpenCVE AI on April 20, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Transformeroptimus
Transformeroptimus superagi
Vendors & Products Transformeroptimus
Transformeroptimus superagi

Mon, 20 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in TransformerOptimus SuperAGI up to 0.0.14. This affects the function extract_with_bs4/extract_with_3k/extract_with_lxml of the file superagi/helper/webpage_extractor.py of the component WebScraperTool. Such manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title TransformerOptimus SuperAGI WebScraperTool webpage_extractor.py extract_with_lxml server-side request forgery
First Time appeared Superagi
Superagi superagi
Weaknesses CWE-918
CPEs cpe:2.3:a:superagi:superagi:*:*:*:*:*:*:*:*
Vendors & Products Superagi
Superagi superagi
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Superagi Superagi
Transformeroptimus Superagi
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T15:54:33.904Z

Reserved: 2026-04-19T16:13:42.171Z

Link: CVE-2026-6616

cve-icon Vulnrichment

Updated: 2026-04-20T15:54:14.597Z

cve-icon NVD

Status : Received

Published: 2026-04-20T08:16:11.390

Modified: 2026-04-20T08:16:11.390

Link: CVE-2026-6616

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:58:03Z

Weaknesses