Authorization Bypass in TransformerOptimus SuperAGI by Vendor
CVE-2026-6583
Key Information:
- Vendor
Transformeroptimus
- Status
- Vendor
- CVE Published:
- 19 April 2026
Badges
What is CVE-2026-6583?
A vulnerability exists in TransformerOptimus SuperAGI versions up to 0.0.14 within the API Key Management Endpoint, specifically in the delete_api_key/edit_api_key functions located in the superagi/controllers/api_key.py file. This issue allows an attacker to bypass authorization remotely, potentially leading to unauthorized access to sensitive functions. The vulnerability was made public, and despite contacting the vendor for a response regarding the disclosure, there has been no acknowledgment. Users of the affected product should take immediate steps to secure their systems.
Affected Version(s)
SuperAGI 0.0.1
SuperAGI 0.0.2
SuperAGI 0.0.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
