CVE-2026-24780: agpt: Code Injection enables RCE
GHSA-r277-3xc5-c79v HIGH PoC AVAILABLE CISA: ATTENDA critical RCE vulnerability in AutoGPT Platform allows any authenticated user—including self-registered attackers in default Supabase deployments—to execute arbitrary Python code on your server by invoking a disabled block that bypasses authorization checks. Patch immediately to v0.6.44+, disable public signup, and rotate all credentials and API keys stored in or accessible from the platform. If self-hosting AutoGPT in production, treat this as an active incident until patched and audited.
Risk Assessment
Effective risk is critical despite the CVSS 8.8 score. In default self-hosted deployments with Supabase signup enabled, the bar for exploitation drops to near-zero—any internet-accessible AutoGPT instance is vulnerable to effectively unauthenticated RCE requiring only a free account registration. Even with signup disabled, a single compromised low-privilege account yields full server control. The low attack complexity, no user interaction requirement, and network accessibility make this trivially exploitable at scale. EPSS of 0.00103 reflects early disclosure, not low exploitability—the attack path is straightforward and the vulnerable code is public.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| agpt | pip | <= 0.2.2 | No patch |
| autogpt_platform | — | — | No patch |
Severity & Risk
Attack Surface
Recommended Action
7 steps-
PATCH
Upgrade to autogpt-platform-beta-v0.6.44 or later immediately—no safe workaround exists that preserves full functionality.
-
QUICK WIN
Disable Supabase public signup to require attackers to have a pre-existing account while patching is underway.
-
NETWORK
Restrict AutoGPT backend API access to trusted networks; place behind VPN or IP allowlist if public exposure is not required.
-
ROTATE CREDENTIALS
After patching, rotate all API keys, LLM provider tokens (OpenAI, Anthropic), and integration credentials stored in or accessible from the platform—assume compromise if unpatched instances were internet-facing.
-
DETECT
Search web and API access logs for requests to block execution endpoints (external/v1/routes.py L79-93 and features/v1.py L1408-1424) using the BlockInstallationBlock UUID; unexpected executions by non-admin users are IOCs.
-
AUDIT FILESYSTEM
Review server filesystem for unexpected Python files written by the platform post-exploit.
-
POST-PATCH: Audit user accounts for unauthorized self-registrations and revoke as needed.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-24780?
A critical RCE vulnerability in AutoGPT Platform allows any authenticated user—including self-registered attackers in default Supabase deployments—to execute arbitrary Python code on your server by invoking a disabled block that bypasses authorization checks. Patch immediately to v0.6.44+, disable public signup, and rotate all credentials and API keys stored in or accessible from the platform. If self-hosting AutoGPT in production, treat this as an active incident until patched and audited.
Is CVE-2026-24780 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2026-24780, increasing the risk of exploitation.
How to fix CVE-2026-24780?
1. PATCH: Upgrade to autogpt-platform-beta-v0.6.44 or later immediately—no safe workaround exists that preserves full functionality. 2. QUICK WIN: Disable Supabase public signup to require attackers to have a pre-existing account while patching is underway. 3. NETWORK: Restrict AutoGPT backend API access to trusted networks; place behind VPN or IP allowlist if public exposure is not required. 4. ROTATE CREDENTIALS: After patching, rotate all API keys, LLM provider tokens (OpenAI, Anthropic), and integration credentials stored in or accessible from the platform—assume compromise if unpatched instances were internet-facing. 5. DETECT: Search web and API access logs for requests to block execution endpoints (external/v1/routes.py L79-93 and features/v1.py L1408-1424) using the BlockInstallationBlock UUID; unexpected executions by non-admin users are IOCs. 6. AUDIT FILESYSTEM: Review server filesystem for unexpected Python files written by the platform post-exploit. 7. POST-PATCH: Audit user accounts for unauthorized self-registrations and revoke as needed.
What systems are affected by CVE-2026-24780?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, AI orchestration platforms, self-hosted AI deployments, API gateways for AI agents.
What is the CVSS score for CVE-2026-24780?
CVE-2026-24780 has a CVSS v3.1 base score of 8.8 (HIGH). The EPSS exploitation probability is 0.12%.
Technical Details
NVD Description
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.44, AutoGPT Platform's block execution endpoints (both main web API and external API) allow executing blocks by UUID without checking the `disabled` flag. Any authenticated user can execute the disabled `BlockInstallationBlock`, which writes arbitrary Python code to the server filesystem and executes it via `__import__()`, achieving Remote Code Execution. In default self-hosted deployments where Supabase signup is enabled, an attacker can self-register; if signup is disabled (e.g., hosted), the attacker needs an existing account. autogpt-platform-beta-v0.6.44 contains a fix.
Exploitation Scenario
An attacker identifies a publicly accessible self-hosted AutoGPT Platform instance. In the default configuration with Supabase signup enabled, the attacker self-registers a free account in seconds. Using the authenticated session, the attacker calls the block execution API endpoint with the well-known UUID of the disabled BlockInstallationBlock—a UUID discoverable directly from the open-source codebase on GitHub without any prior system access. The attacker embeds a Python reverse shell or credential-harvesting payload; the platform writes this code to the server filesystem and executes it via Python's __import__() function, achieving OS-level code execution. The attacker then exfiltrates all stored LLM provider API keys, cloud credentials, and agent workflow configurations, establishes persistence, and pivots into connected downstream services. The entire attack requires no AI/ML expertise—only basic HTTP API interaction and knowledge of the public GitHub repository.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References
- github.com/advisories/GHSA-r277-3xc5-c79v
- nvd.nist.gov/vuln/detail/CVE-2026-24780
- github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/api/external/v1/routes.py Product
- github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/api/features/v1.py Product
- github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/api/features/v1.py Product
- github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/blocks/block.py Product
- github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/data/block.py Product
- github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-r277-3xc5-c79v Exploit Vendor
Timeline
Related Vulnerabilities
CVE-2025-5120 10.0 smolagents: sandbox escape enables unauthenticated RCE
Same attack type: Code Execution CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same attack type: Code Execution CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Auth Bypass CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Auth Bypass CVE-2024-2912 10.0 BentoML: RCE via insecure deserialization (CVSS 10)
Same attack type: Code Execution
AI Threat Alert