CVE-2026-6612 PUBLISHED

TransformerOptimus SuperAGI Agent Execution Endpoint agent_execution.py update_agent_execution authorization

Assigner: VulDB
Reserved: 19.04.2026 Published: 20.04.2026 Updated: 20.04.2026

A vulnerability was determined in TransformerOptimus SuperAGI up to 0.0.14. This impacts the function get_agent_execution/update_agent_execution of the file superagi/controllers/agent_execution.py of the component Agent Execution Endpoint. Executing a manipulation of the argument agent_execution_id can lead to authorization bypass. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 5.3

Product Status

Vendor TransformerOptimus
Product SuperAGI
Versions
  • Version 0.0.1 is affected
  • Version 0.0.2 is affected
  • Version 0.0.3 is affected
  • Version 0.0.4 is affected
  • Version 0.0.5 is affected
  • Version 0.0.6 is affected
  • Version 0.0.7 is affected
  • Version 0.0.8 is affected
  • Version 0.0.9 is affected
  • Version 0.0.10 is affected
  • Version 0.0.11 is affected
  • Version 0.0.12 is affected
  • Version 0.0.13 is affected
  • Version 0.0.14 is affected

Credits

  • Eric-z (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Authorization Bypass CWE
  • Improper Authorization CWE