Authorization Bypass in TransformerOptimus SuperAGI by Vendor
CVE-2026-6585
Key Information:
- Vendor
Transformeroptimus
- Status
- Vendor
- CVE Published:
- 19 April 2026
Badges
What is CVE-2026-6585?
A vulnerability exists in the organisation update function of TransformerOptimus SuperAGI, specifically in the update_organisation method located in the superagi/controllers/organisation.py file. This flaw allows for an authorization bypass due to improper handling of the organisation_id parameter. As a result, attackers can exploit this vulnerability to initiate unauthorized actions remotely. Despite early disclosures to the vendor concerning this issue, there was no response, leaving affected users at risk. Proper measures should be taken to mitigate this vulnerability as exploitation is now publicly known.
Affected Version(s)
SuperAGI 0.0.1
SuperAGI 0.0.2
SuperAGI 0.0.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
