SuperAGI is vulnerable to remote code execution in the latest version. The `agent template update` API allows attackers to control certain parameters, which are then fed to the eval function without any sanitization or checks in place. This vulnerability can lead to full system compromise.
References
Link | Resource |
---|---|
https://huntr.com/bounties/d710884f-b5ab-4b31-a2e6-e4b38488def1 | Exploit Third Party Advisory |
Configurations
History
14 Jul 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/d710884f-b5ab-4b31-a2e6-e4b38488def1 - Exploit, Third Party Advisory | |
First Time |
Superagi superagi
Superagi |
|
CPE | cpe:2.3:a:superagi:superagi:0.0.14:*:*:*:*:*:*:* | |
Summary |
|
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-14 20:16
NVD link : CVE-2024-9439
Mitre link : CVE-2024-9439
CVE.ORG link : CVE-2024-9439
JSON object : View
Products Affected
superagi
- superagi
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')