CVE-2024-8156

A command injection vulnerability exists in the workflow-checker.yml workflow of significant-gravitas/autogpt. The untrusted user input `github.head.ref` is used insecurely, allowing an attacker to inject arbitrary commands. This vulnerability affects versions up to and including the latest version. An attacker can exploit this by creating a branch name with a malicious payload and opening a pull request, potentially leading to reverse shell access or theft of sensitive tokens and keys.
Configurations

Configuration 1 (hide)

cpe:2.3:a:agpt:autogpt_classic:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-03-20 10:15

Updated : 2025-10-15 13:15


NVD link : CVE-2024-8156

Mitre link : CVE-2024-8156

CVE.ORG link : CVE-2024-8156


JSON object : View

Products Affected

agpt

  • autogpt_classic
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')