CVE-2025-32393
Unknown Unknown - Not Provided
Denial of Service in AutoGPT RSSBlock via Unrestricted XML Parsing

Publication date: 2026-02-05

Last updated on: 2026-02-17

Assigner: GitHub, Inc.

Description
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.32, there is a DoS vulnerability in ReadRSSFeedBlock. In RSSBlock, feedparser.parser is called to obtain the XML file according to the URL input by the user, parse the XML, and finally obtain the parsed result. However, during the parsing process, there is no limit on the parsing time and the resources that can be allocated for parsing. When a malicious user lets RSSBlock parse a carefully constructed, deep XML, it will cause memory resources to be exhausted, eventually causing DoS. This issue has been patched in autogpt-platform-beta-v0.6.32.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-05
Last Modified
2026-02-17
Generated
2026-05-07
AI Q&A
2026-02-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
agpt autogpt_platform to 0.6.32 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in AutoGPT's ReadRSSFeedBlock component, where the system parses XML files from user-provided URLs using feedparser.parser. The issue is that there is no limit on the parsing time or the resources allocated during this process. A malicious user can exploit this by providing a specially crafted, deeply nested XML file that causes the parser to consume excessive memory resources, leading to a denial of service (DoS) condition.

This vulnerability was present prior to version autogpt-platform-beta-v0.6.32 and has been fixed in that version.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a denial of service (DoS) attack. An attacker can cause the AutoGPT platform to exhaust its memory resources by feeding it a maliciously crafted XML file, which can crash or severely degrade the performance of the system. This can disrupt the availability of services relying on AutoGPT, potentially causing downtime and loss of productivity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade AutoGPT to version autogpt-platform-beta-v0.6.32 or later, where the issue has been patched.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart