CVE-2026-6582
Authentication Bypass in TransformerOptimus SuperAGI Vector DB Endpoint
Publication date: 2026-04-19
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| transformeroptimus | superagi | to 0.0.14 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in TransformerOptimus SuperAGI up to version 0.0.14, specifically in the function get_vector_db_details within the Vector Database Management Endpoint component. The flaw allows an attacker to manipulate the function in a way that bypasses authentication.
The attack can be executed remotely, meaning an attacker does not need local access to exploit it. The exploit has already been published and may be used by attackers.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access to the Vector Database Management Endpoint by bypassing authentication controls.
Because the attack can be performed remotely without any privileges or user interaction, it increases the risk of unauthorized data access or manipulation.
The impact includes potential confidentiality, integrity, and availability issues as indicated by the CVSS scores, which rate the vulnerability as moderately severe.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows for missing authentication due to a flaw in the Vector Database Management Endpoint, which can be exploited remotely. Such a security flaw could potentially lead to unauthorized access to sensitive data.
Unauthorized access resulting from missing authentication may impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive information.
However, specific details on how this vulnerability directly affects compliance with these standards are not provided in the available information.