Description
All versions of `SuperAGI` are vulnerable to Arbitrary Code Execution due to unsafe use of the ‘eval’ function. An attacker could induce the LLM output to exploit this vulnerability and gain arbitrary code execution on the SuperAGI application server.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19201 | All versions of `SuperAGI` are vulnerable to Arbitrary Code Execution due to unsafe use of the ‘eval’ function. An attacker could induce the LLM output to exploit this vulnerability and gain arbitrary code execution on the SuperAGI application server. |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-01T22:27:34.853Z
Reserved: 2023-12-22T12:33:20.128Z
Link: CVE-2024-21552
Updated: 2024-08-01T22:27:34.853Z
Status : Deferred
Published: 2024-07-22T15:15:02.410
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-21552
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:42:24Z
Weaknesses
EUVD