CVE-2025-53944: AutoGPT Authorization Bypass Exposes Execution Results
AutoGPT, a platform for managing AI agents, has addressed an authorization bypass vulnerability. Versions 0.6.15 and earlier are affected. This flaw allows authenticated users to access sensitive execution results from other users' agents. Upgrade to v0.6.16 to remediate this issue.
Vulnerability Details
- CVE ID: CVE-2025-53944
- Description: The
get_graph_execution_resultsendpoint in AutoGPT's external API lacks proper authorization checks. While thegraph_idis validated, thegraph_exec_idparameter is not, allowing authenticated users to access arbitrary execution results. - CVSS Score: 7.7 HIGH
- CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
- CVSS Explanation: A network-based attack with low complexity. An attacker with low privileges (an ordinary authenticated user) can, without user interaction, impact the confidentiality of the system. The scope is changed because the vulnerability can affect resources beyond the attacker's intended access.
- Exploit Requirements: An attacker needs a valid AutoGPT user account. No special skills are required to exploit this vulnerability.
- Affected Vendor: Significant-Gravitas
- Affected Product: AutoGPT
- Affected Version: Versions 0.6.15 and below
- CWE: CWE-285: Improper Authorization
- CWE Explanation: Improper authorization occurs when a system does not adequately ensure that the user or process attempting an action has the necessary permissions. In this case, AutoGPT failed to check the user's permission to access specific execution results.
Timeline of Events
- 2025-07-30: Vulnerability publicly disclosed.
- 2025-07-30: AutoGPT v0.6.16 released with a fix.
Exploitability & Real-World Risk
This vulnerability poses a significant risk because it's easily exploitable. Any authenticated user can potentially view sensitive information related to other users' AI agent executions. This could include prompts, results, and even API keys stored in execution data. In a real-world scenario, an attacker could use this vulnerability to steal proprietary information, gain unauthorized access to connected services, or manipulate AI agent behavior.
Recommendations
- Upgrade to AutoGPT v0.6.16 or later: This version includes the fix for the authorization bypass vulnerability.
- Review User Permissions: Regularly review user permissions within your AutoGPT instance to ensure appropriate access controls.
- Monitor API Access: Implement monitoring to detect suspicious access patterns to the
get_graph_execution_resultsendpoint.
Technical Insight
The vulnerability stems from insufficient input validation on the graph_exec_id parameter in the get_graph_execution_results endpoint. The application correctly validates the graph_id, ensuring the user has access to the overall graph. However, it fails to verify if the user is authorized to view the specific execution results identified by the graph_exec_id, allowing access to any execution result if the user knows its ID.
Credit to Researcher(s)
This vulnerability was reported via GitHub Security Advisory.
References
- GitHub Security Advisory
- Commit fixing the vulnerability
- AutoGPT v0.6.16 Release Notes
- GHSA-x77j-qg2x-fgg6
Tags
#AutoGPT #CVE-2025-53944 #AuthorizationBypass #Security #Python
Summary: AutoGPT versions 0.6.15 and below contain an authorization bypass vulnerability in the `get_graph_execution_results` endpoint, allowing authenticated users to access arbitrary execution results. Upgrade to version 0.6.16 to mitigate this risk.
CVE ID: CVE-2025-53944
Risk Analysis: Successful exploitation of this vulnerability can lead to the disclosure of sensitive information, including prompts, results, and API keys, potentially granting unauthorized access to connected services or allowing manipulation of AI agent behavior.
Recommendation: Upgrade to AutoGPT version 0.6.16 or later to patch this vulnerability. Review user permissions and monitor API access for suspicious activity.
Timeline
- 2025-07-30: Vulnerability publicly disclosed and AutoGPT v0.6.16 released.
References
- https://github.com/Significant-Gravitas/AutoGPT/commit/309114a727baa2063357810d444e9a119f8dd7f6
- https://github.com/Significant-Gravitas/AutoGPT/releases/tag/autogpt-platform-beta-v0.6.16
- https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-x77j-qg2x-fgg6
- https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-x77j-qg2x-fgg6