Path Traversal Vulnerability in TransformerOptimus SuperAGI EmailToolKit
CVE-2025-6280
Key Information:
- Vendor
Transformeroptimus
- Status
- Vendor
- CVE Published:
- 19 June 2025
Badges
What is CVE-2025-6280?
A path traversal vulnerability has been identified in the EmailToolKit component of TransformerOptimus SuperAGI versions up to 0.0.14. This security flaw affects the 'download_attachment' function located in the read_email.py file. By manipulating the 'filename' argument, an attacker could potentially access restricted files on the server, posing significant risks to file security and user data integrity. This issue has been made publicly known, heightening its potential for exploitation.
Affected Version(s)
SuperAGI 0.0.1
SuperAGI 0.0.2
SuperAGI 0.0.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved