CVE-2024-9418: CWE-256 Unprotected Storage of Credentials in transformeroptimus transformeroptimus/superagi
In version 0.0.14 of transformeroptimus/superagi, the API endpoint `/api/users/get/{id}` returns the user's password in plaintext. This vulnerability allows an attacker to retrieve the password of another user, leading to potential account takeover.
CVE-2024-9418: CWE-256 Unprotected Storage of Credentials in transformeroptimus transformeroptimus/superagi
Description
In version 0.0.14 of transformeroptimus/superagi, the API endpoint `/api/users/get/{id}` returns the user's password in plaintext. This vulnerability allows an attacker to retrieve the password of another user, leading to potential account takeover.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-10-01T19:08:42.452Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2f178f764e1f470ee2
Added to database: 10/15/2025, 1:01:35 PM
Last updated: 10/15/2025, 1:03:22 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-1796: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in langgenius langgenius/dify
HighCVE-2025-1451: CWE-770 Allocation of Resources Without Limits or Throttling in parisneo parisneo/lollms-webui
HighCVE-2025-1040: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine in significant-gravitas significant-gravitas/autogpt
HighCVE-2025-0628: CWE-266 Incorrect Privilege Assignment in berriai berriai/litellm
HighCVE-2025-0508: CWE-328 Reversible One-Way Hash in aws aws/sagemaker-python-sdk
MediumActions
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.