A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific commands, such as 'whoami' and '/bin/whoami'. An attacker can circumvent this restriction by executing commands with a modified path, such as '/bin/./whoami', which is not recognized by the denylist.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed | Patch | 
| https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 | Exploit Third Party Advisory | 
Configurations
                    History
                    05 Aug 2025, 15:35
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Agpt autogpt Classic | |
| CPE | cpe:2.3:a:agpt:autogpt_classic:0.5.1:*:*:*:*:*:*:* | 
18 Sep 2024, 18:41
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed - Patch | |
| References | () https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 - Exploit, Third Party Advisory | |
| Summary | 
 | |
| First Time | Agpt Agpt autogpt | |
| CPE | cpe:2.3:a:agpt:autogpt:0.5.1:*:*:*:*:*:*:* | 
11 Sep 2024, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-09-11 13:15
Updated : 2025-08-05 15:35
NVD link : CVE-2024-6091
Mitre link : CVE-2024-6091
CVE.ORG link : CVE-2024-6091
JSON object : View
Products Affected
                agpt
- autogpt_classic
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
