CVE-2026-6614
Received Received - Intake
Authorization Bypass in TransformerOptimus SuperAGI Project Controller

Publication date: 2026-04-20

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in TransformerOptimus SuperAGI up to 0.0.14. Affected by this vulnerability is the function get_project/update_project/get_projects_organisation of the file superagi/controllers/project.py. The manipulation results in authorization bypass. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-20
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
transformeroptimus superagi to 0.0.14 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in TransformerOptimus SuperAGI versions up to 0.0.14, specifically in the functions get_project, update_project, and get_projects_organisation within the file superagi/controllers/project.py.

The flaw allows an attacker to bypass authorization controls, meaning they can perform actions or access data without proper permissions.

The attack can be executed remotely, and the exploit code has been publicly released, increasing the risk of exploitation.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access or modification of project-related data within the affected application.

Because the authorization bypass can be exploited remotely, attackers may gain access without needing valid credentials or proper permissions.

Such unauthorized access could result in data breaches, manipulation of project information, or disruption of normal operations.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated users to bypass authorization controls and access or modify projects across different organizations without proper permission. Such unauthorized access and modification can lead to information disclosure and data integrity issues.

Because the vulnerability enables exposure and alteration of potentially sensitive organizational data, it may negatively impact compliance with data protection regulations such as GDPR and HIPAA, which require strict access controls and protection of personal and organizational data.

Specifically, the lack of authorization checks could result in unauthorized disclosure of confidential information and unauthorized changes to data, both of which are violations of common regulatory requirements for data confidentiality, integrity, and security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the affected API endpoints for improper authorization checks. Specifically, you can attempt to access or modify projects belonging to organizations that the authenticated user should not have access to.

  • Use an authenticated JWT token to send a GET request to the endpoint `/projects/get/organisation/{organisation_id}` with an organisation_id that the user does not belong to and check if the project list is returned.
  • Send a GET request to `/projects/get/{project_id}` for a project outside the user's organization and verify if project details are accessible.
  • Send a PUT request to `/projects/update/{project_id}` with modified project data for a project outside the user's organization and check if the update is accepted.

Example curl commands (replace placeholders accordingly):

  • curl -H "Authorization: Bearer <JWT_TOKEN>" https://<target>/projects/get/organisation/<other_org_id>
  • curl -H "Authorization: Bearer <JWT_TOKEN>" https://<target>/projects/get/<project_id>
  • curl -X PUT -H "Authorization: Bearer <JWT_TOKEN>" -H "Content-Type: application/json" -d '{"name":"test","description":"test"}' https://<target>/projects/update/<project_id>

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable API endpoints and ensuring proper authorization checks are implemented.

  • Restrict access to the project management API endpoints to only trusted users or internal networks until a patch is applied.
  • Implement or enforce authorization checks that verify the authenticated user belongs to the organization owning the project before allowing access or modification.
  • Monitor logs for suspicious access patterns such as users accessing projects or organizations they should not have access to.
  • Apply any available patches or updates from the vendor once they become available.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart