Authorization Bypass in TransformerOptimus SuperAGI by Unauthorized Agents
CVE-2026-6612
Key Information:
- Vendor
Transformeroptimus
- Status
- Vendor
- CVE Published:
- 20 April 2026
Badges
What is CVE-2026-6612?
A security vulnerability in TransformerOptimus SuperAGI, specifically in the Agent Execution Endpoint, allows remote attackers to manipulate the argument agent_execution_id, enabling an authorization bypass. This issue arises in the get_agent_execution and update_agent_execution functions within superagi/controllers/agent_execution.py. The vulnerability has been made public, and despite early notification to the vendor, there has been no response regarding remedial action.
Affected Version(s)
SuperAGI 0.0.1
SuperAGI 0.0.2
SuperAGI 0.0.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
