A command injection vulnerability exists in the workflow-checker.yml workflow of significant-gravitas/autogpt. The untrusted user input `github.head.ref` is used insecurely, allowing an attacker to inject arbitrary commands. This vulnerability affects versions up to and including the latest version. An attacker can exploit this by creating a branch name with a malicious payload and opening a pull request, potentially leading to reverse shell access or theft of sensitive tokens and keys.
References
Configurations
History
01 Apr 2025, 20:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:agpt:autogpt:*:*:*:*:*:*:*:* | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/significant-gravitas/autogpt/commit/1df7d527dd37dff8363dc162fb58d300f072e302 - Patch | |
References | () https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51 - Exploit | |
First Time |
Agpt
Agpt autogpt |
20 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51 - |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-04-01 20:32
NVD link : CVE-2024-8156
Mitre link : CVE-2024-8156
CVE.ORG link : CVE-2024-8156
JSON object : View
Products Affected
agpt
- autogpt
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')