A command injection vulnerability exists in the workflow-checker.yml workflow of significant-gravitas/autogpt. The untrusted user input `github.head.ref` is used insecurely, allowing an attacker to inject arbitrary commands. This vulnerability affects versions up to and including the latest version. An attacker can exploit this by creating a branch name with a malicious payload and opening a pull request, potentially leading to reverse shell access or theft of sensitive tokens and keys.
                
            References
                    Configurations
                    History
                    15 Oct 2025, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-77 | 
05 Aug 2025, 15:35
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Agpt autogpt Classic | |
| CPE | cpe:2.3:a:agpt:autogpt_classic:*:*:*:*:*:*:*:* | 
01 Apr 2025, 20:32
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| CPE | cpe:2.3:a:agpt:autogpt:*:*:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| First Time | Agpt autogpt Agpt | |
| References | () https://github.com/significant-gravitas/autogpt/commit/1df7d527dd37dff8363dc162fb58d300f072e302 - Patch | |
| References | () https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51 - Exploit | 
20 Mar 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51 - | 
20 Mar 2025, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-20 10:15
Updated : 2025-10-15 13:15
NVD link : CVE-2024-8156
Mitre link : CVE-2024-8156
CVE.ORG link : CVE-2024-8156
JSON object : View
Products Affected
                agpt
- autogpt_classic
CWE
                
                    
                        
                        CWE-77
                        
            Improper Neutralization of Special Elements used in a Command ('Command Injection')
