Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28710 | A vulnerability, which was classified as critical, was found in TransformerOptimus SuperAGI up to 0.0.14. Affected is the function download_attachment of the file SuperAGI/superagi/helper/read_email.py of the component EmailToolKit. The manipulation of the argument filename leads to path traversal. The exploit has been disclosed to the public and may be used. |
Thu, 10 Jul 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Superagi
Superagi superagi |
|
| CPEs | cpe:2.3:a:superagi:superagi:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Superagi
Superagi superagi |
Mon, 23 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Jun 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as critical, was found in TransformerOptimus SuperAGI up to 0.0.14. Affected is the function download_attachment of the file SuperAGI/superagi/helper/read_email.py of the component EmailToolKit. The manipulation of the argument filename leads to path traversal. The exploit has been disclosed to the public and may be used. | |
| Title | TransformerOptimus SuperAGI EmailToolKit read_email.py download_attachment path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-23T19:29:57.906Z
Reserved: 2025-06-19T06:55:34.431Z
Link: CVE-2025-6280
Updated: 2025-06-23T16:16:22.548Z
Status : Analyzed
Published: 2025-06-19T22:15:20.160
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-6280
No data.
OpenCVE Enrichment
No data.
EUVD