CVE-2026-26020
Remote Code Execution via Disabled Block Bypass in AutoGPT
Publication date: 2026-02-12
Last updated on: 2026-02-17
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| agpt | autogpt_platform | to 0.6.48 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-26020 is a critical security vulnerability in the AutoGPT platform that allowed authenticated users to execute arbitrary Python code on the backend server. This was possible because a special development block called BlockInstallationBlock, which was marked as disabled to prevent its use, was not properly checked during graph validation. Although the block was disabled and hidden from the user interface, the validation process did not enforce this disabled status when the block was included as a node in a graph. As a result, users could bypass restrictions and achieve Remote Code Execution (RCE) by embedding this disabled block inside a graph.
The vulnerability was fixed in version 0.6.48 by adding strict checks during graph validation and execution to reject any graph containing disabled blocks and prevent their execution at runtime.
How can this vulnerability impact me? :
This vulnerability allows any authenticated user with low privileges to execute arbitrary code on the backend server, leading to a full compromise of the system.
- Attackers can gain full access to environment secrets such as database credentials and service keys.
- They can read from and write to the database directly.
- It enables lateral movement to internal services within the network.
- Attackers can maintain persistence by accessing and modifying files on disk within the container.
Overall, this vulnerability severely compromises the confidentiality, integrity, and availability of the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "To detect exploitation of CVE-2026-26020 on your system, you should audit your AutoGPT instance for graphs that include the vulnerable disabled block with ID '45e78db5-03e9-447f-9395-308d712f5f08'. This can be done by querying the database for any graphs referencing this block ID."}, {'type': 'paragraph', 'content': 'Additionally, check for unauthorized Python files in the backend/blocks/ directory, which may indicate arbitrary code execution attempts.'}, {'type': 'paragraph', 'content': 'Suggested commands include database queries to find graphs containing the vulnerable block ID and filesystem searches for suspicious Python files. For example:'}, {'type': 'list_item', 'content': "SQL query to find graphs with the vulnerable block ID: SELECT * FROM graphs WHERE nodes LIKE '%45e78db5-03e9-447f-9395-308d712f5f08%';"}, {'type': 'list_item', 'content': "Filesystem search for unauthorized Python files: find backend/blocks/ -type f -name '*.py' -exec ls -l {} \\;"}, {'type': 'paragraph', 'content': 'If such entries or files are found, treat the instance as compromised and conduct a thorough security audit.'}] [2]
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update AutoGPT to version 0.6.48 or later, where the vulnerability is fixed by enforcing the disabled flag during graph validation and execution.
If you are running a self-hosted instance, immediately apply the patch or upgrade to the fixed release to prevent exploitation.
If you suspect your instance has been compromised, rotate all backend secrets such as database credentials and service keys, and audit for unauthorized changes or persistence mechanisms.
Additionally, review your system logs and database for signs of exploitation as described in detection steps.