CVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
CVE-2025-32393 is a high-severity denial-of-service (DoS) vulnerability in Significant-Gravitas AutoGPT versions prior to autogpt-platform-beta-v0. 6. 32. The flaw exists in the ReadRSSFeedBlock component, where the feedparser. parser processes user-supplied RSS XML feeds without any limits on parsing time or resource allocation. An attacker can exploit this by submitting a deeply nested or maliciously crafted XML feed, causing excessive memory consumption and ultimately crashing or severely degrading the AutoGPT service. This vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. Although no known exploits are currently in the wild, the CVSS 8. 7 score reflects the high impact on availability and ease of exploitation. The issue has been patched in version 0.
AI Analysis
Technical Summary
CVE-2025-32393 is a denial-of-service vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting Significant-Gravitas AutoGPT prior to version 0.6.32. AutoGPT is a platform enabling continuous AI agents to automate complex workflows, including RSS feed parsing via the ReadRSSFeedBlock component. The vulnerability arises because the feedparser.parser function processes XML feeds without imposing limits on parsing time or memory allocation. An attacker can craft a deeply nested or malicious XML feed that causes the parser to consume excessive memory, leading to resource exhaustion and denial of service. This can crash the AutoGPT service or severely degrade its performance, disrupting automated AI workflows. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on availability. Although no public exploits are known, the issue has been patched in autogpt-platform-beta-v0.6.32. Organizations relying on AutoGPT for AI-driven automation should prioritize patching and consider additional controls such as input validation and resource monitoring to mitigate potential exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of AI automation services powered by AutoGPT. Disruption of these services can halt critical automated workflows, leading to operational delays, reduced productivity, and potential financial losses. Industries heavily investing in AI automation, such as manufacturing, finance, and technology sectors, may experience cascading effects if AutoGPT services become unavailable. Given the remote and unauthenticated exploitability, attackers could launch DoS attacks at scale, potentially targeting multiple organizations simultaneously. The lack of user interaction or privileges required lowers the barrier for exploitation, increasing the threat landscape. Additionally, organizations that integrate AutoGPT into customer-facing or critical infrastructure systems risk reputational damage and compliance issues if service disruptions occur. The impact is amplified in countries with advanced AI adoption and digital transformation initiatives, where reliance on continuous AI agents is higher.
Mitigation Recommendations
1. Immediate upgrade to autogpt-platform-beta-v0.6.32 or later versions where the vulnerability is patched. 2. Implement strict input validation and sanitization on all RSS feed URLs and XML content before parsing to detect and reject deeply nested or malformed XML structures. 3. Introduce resource usage limits and timeouts on XML parsing operations within AutoGPT to prevent excessive memory consumption. 4. Deploy runtime monitoring tools to track memory and CPU usage of AutoGPT processes, enabling rapid detection of anomalous resource spikes. 5. Use network-level protections such as web application firewalls (WAFs) to filter and block suspicious RSS feed requests or malformed XML payloads. 6. Conduct regular security assessments and fuzz testing on XML parsing components to identify and remediate similar resource exhaustion issues proactively. 7. Educate developers and operators on secure coding practices related to XML processing and resource management. 8. Maintain an incident response plan that includes procedures for mitigating DoS attacks targeting AI automation platforms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
Description
CVE-2025-32393 is a high-severity denial-of-service (DoS) vulnerability in Significant-Gravitas AutoGPT versions prior to autogpt-platform-beta-v0. 6. 32. The flaw exists in the ReadRSSFeedBlock component, where the feedparser. parser processes user-supplied RSS XML feeds without any limits on parsing time or resource allocation. An attacker can exploit this by submitting a deeply nested or maliciously crafted XML feed, causing excessive memory consumption and ultimately crashing or severely degrading the AutoGPT service. This vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. Although no known exploits are currently in the wild, the CVSS 8. 7 score reflects the high impact on availability and ease of exploitation. The issue has been patched in version 0.
AI-Powered Analysis
Technical Analysis
CVE-2025-32393 is a denial-of-service vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting Significant-Gravitas AutoGPT prior to version 0.6.32. AutoGPT is a platform enabling continuous AI agents to automate complex workflows, including RSS feed parsing via the ReadRSSFeedBlock component. The vulnerability arises because the feedparser.parser function processes XML feeds without imposing limits on parsing time or memory allocation. An attacker can craft a deeply nested or malicious XML feed that causes the parser to consume excessive memory, leading to resource exhaustion and denial of service. This can crash the AutoGPT service or severely degrade its performance, disrupting automated AI workflows. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on availability. Although no public exploits are known, the issue has been patched in autogpt-platform-beta-v0.6.32. Organizations relying on AutoGPT for AI-driven automation should prioritize patching and consider additional controls such as input validation and resource monitoring to mitigate potential exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of AI automation services powered by AutoGPT. Disruption of these services can halt critical automated workflows, leading to operational delays, reduced productivity, and potential financial losses. Industries heavily investing in AI automation, such as manufacturing, finance, and technology sectors, may experience cascading effects if AutoGPT services become unavailable. Given the remote and unauthenticated exploitability, attackers could launch DoS attacks at scale, potentially targeting multiple organizations simultaneously. The lack of user interaction or privileges required lowers the barrier for exploitation, increasing the threat landscape. Additionally, organizations that integrate AutoGPT into customer-facing or critical infrastructure systems risk reputational damage and compliance issues if service disruptions occur. The impact is amplified in countries with advanced AI adoption and digital transformation initiatives, where reliance on continuous AI agents is higher.
Mitigation Recommendations
1. Immediate upgrade to autogpt-platform-beta-v0.6.32 or later versions where the vulnerability is patched. 2. Implement strict input validation and sanitization on all RSS feed URLs and XML content before parsing to detect and reject deeply nested or malformed XML structures. 3. Introduce resource usage limits and timeouts on XML parsing operations within AutoGPT to prevent excessive memory consumption. 4. Deploy runtime monitoring tools to track memory and CPU usage of AutoGPT processes, enabling rapid detection of anomalous resource spikes. 5. Use network-level protections such as web application firewalls (WAFs) to filter and block suspicious RSS feed requests or malformed XML payloads. 6. Conduct regular security assessments and fuzz testing on XML parsing components to identify and remediate similar resource exhaustion issues proactively. 7. Educate developers and operators on secure coding practices related to XML processing and resource management. 8. Maintain an incident response plan that includes procedures for mitigating DoS attacks targeting AI automation platforms.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-06T19:46:02.463Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6985247ef9fa50a62f494945
Added to database: 2/5/2026, 11:15:10 PM
Last enriched: 2/5/2026, 11:29:27 PM
Last updated: 2/6/2026, 2:53:43 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.