Impact
The vulnerability originates in the extract_with_bs4, extract_with_3k, and extract_with_lxml functions of the WebScraperTool component. User‑provided URLs are processed without proper validation, allowing an attacker to supply arbitrary URLs that the server will request. This results in a server‑side request forgery, which can expose internal resources, leak data, or enable further attacks. The weakness is identified as CWE‑918.
Affected Systems
TransformerOptimus SuperAGI versions up to and including 0.0.14 are affected. No other products or versions are listed.
Risk and Exploitability
The vulnerability has a CVSS score of 5.3, indicating moderate severity. No EPSS information is available and the issue is not currently listed in the CISA KEV catalog, suggesting that it has not yet been broadly exploited in the wild. However, remote exploitation is possible and an exploit has been publicly disclosed, implying that attackers could target vulnerable deployments from outside the network. Because the vulnerability is an SSRF, the attacker’s ability to impact the system depends on the internal network topology and the services accessed by the SSRF.
OpenCVE Enrichment