Authorization Bypass in TransformerOptimus SuperAGI by AI Powered Intelligence
CVE-2026-6613
Key Information:
- Vendor
Transformeroptimus
- Status
- Vendor
- CVE Published:
- 20 April 2026
Badges
What is CVE-2026-6613?
A vulnerability within TransformerOptimus SuperAGI allows unauthorized access through manipulated agent_id arguments in several functions, including delete_agent, stop_schedule, and get_schedule_data. This flaw permits remote exploitation, enabling attackers to bypass authorization checks effectively. Although the vendor was notified about this issue, there has been no response, raising concerns about the security of users who may be affected by this vulnerability.
Affected Version(s)
SuperAGI 0.0.1
SuperAGI 0.0.2
SuperAGI 0.0.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
