CVE-2026-6582
Received Received - Intake
Authentication Bypass in TransformerOptimus SuperAGI Vector DB Endpoint

Publication date: 2026-04-19

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in TransformerOptimus SuperAGI up to 0.0.14. Affected by this issue is the function get_vector_db_details of the file superagi/controllers/vector_dbs.py of the component Vector Database Management Endpoint. Executing a manipulation can lead to missing authentication. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-19
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
transformeroptimus superagi to 0.0.14 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw in TransformerOptimus SuperAGI up to version 0.0.14, specifically in the function get_vector_db_details within the Vector Database Management Endpoint component. The flaw allows an attacker to manipulate the function in a way that bypasses authentication.

The attack can be executed remotely, meaning an attacker does not need local access to exploit it. The exploit has already been published and may be used by attackers.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to the Vector Database Management Endpoint by bypassing authentication controls.

Because the attack can be performed remotely without any privileges or user interaction, it increases the risk of unauthorized data access or manipulation.

The impact includes potential confidentiality, integrity, and availability issues as indicated by the CVSS scores, which rate the vulnerability as moderately severe.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows for missing authentication due to a flaw in the Vector Database Management Endpoint, which can be exploited remotely. Such a security flaw could potentially lead to unauthorized access to sensitive data.

Unauthorized access resulting from missing authentication may impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive information.

However, specific details on how this vulnerability directly affects compliance with these standards are not provided in the available information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart