CVE-2024-9439

SuperAGI is vulnerable to remote code execution in the latest version. The `agent template update` API allows attackers to control certain parameters, which are then fed to the eval function without any sanitization or checks in place. This vulnerability can lead to full system compromise.
References
Link Resource
https://huntr.com/bounties/d710884f-b5ab-4b31-a2e6-e4b38488def1 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:superagi:superagi:0.0.14:*:*:*:*:*:*:*

History

14 Jul 2025, 20:16

Type Values Removed Values Added
References () https://huntr.com/bounties/d710884f-b5ab-4b31-a2e6-e4b38488def1 - () https://huntr.com/bounties/d710884f-b5ab-4b31-a2e6-e4b38488def1 - Exploit, Third Party Advisory
First Time Superagi superagi
Superagi
CPE cpe:2.3:a:superagi:superagi:0.0.14:*:*:*:*:*:*:*
Summary
  • (es) SuperAGI es vulnerable a la ejecución remota de código en la última versión. La API de actualización de plantilla de agente permite a los atacantes controlar ciertos parámetros, que luego se introducen en la función eval sin ninguna depuración ni comprobación. Esta vulnerabilidad puede comprometer por completo el sistema.

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-14 20:16


NVD link : CVE-2024-9439

Mitre link : CVE-2024-9439

CVE.ORG link : CVE-2024-9439


JSON object : View

Products Affected

superagi

  • superagi
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')