Arbitrary File Overwrite (AFO) in superagi.controllers.resources.upload in TransformerOptimus SuperAGI 0.0.14 allows remote attackers to overwrite arbitrary files via unsanitised filenames submitted to the file upload endpoint, due to improper handling of directory traversal in os.path.join() and lack of path validation in get_root_input_dir().
References
| Link | Resource |
|---|---|
| https://github.com/TransformerOptimus/SuperAGI | Product |
| https://github.com/TransformerOptimus/SuperAGI/pull/1463 | Exploit Issue Tracking |
| https://www.gecko.security/blog/cve-2025-51475 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-07-22 20:15
Updated : 2025-10-09 16:08
NVD link : CVE-2025-51475
Mitre link : CVE-2025-51475
CVE.ORG link : CVE-2025-51475
JSON object : View
Products Affected
superagi
- superagi
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
