CVE-2025-51472: n/a
Code Injection in AgentTemplate.eval_agent_config in TransformerOptimus SuperAGI 0.0.14 allows remote attackers to execute arbitrary Python code via malicious values in agent template configurations such as the goal, constraints, or instruction field, which are evaluated using eval() without validation during template loading or updates.
AI Analysis
Technical Summary
CVE-2025-51472 is a code injection vulnerability identified in the TransformerOptimus SuperAGI software, specifically in the function AgentTemplate.eval_agent_config. This vulnerability arises because the software evaluates certain agent template configuration fields—such as goal, constraints, or instruction—using Python's eval() function without proper input validation or sanitization. Since eval() executes the passed string as Python code, an attacker who can supply malicious values in these configuration fields can execute arbitrary Python code remotely on the affected system. The vulnerability does not require authentication or user interaction, and it can be exploited over the network (AV:N), with low attack complexity (AC:L). The CVSS v3.1 base score is 6.5, indicating a medium severity level. The impact primarily affects confidentiality and integrity, as arbitrary code execution can lead to data leakage or unauthorized modification, but availability impact is not indicated. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability is classified under CWE-77, which relates to improper neutralization of special elements used in a command ('Command Injection'). This vulnerability is critical to address because it allows remote code execution without any authentication, potentially enabling attackers to fully compromise affected systems running vulnerable versions of TransformerOptimus SuperAGI 0.0.14 or similar.
Potential Impact
For European organizations using TransformerOptimus SuperAGI, this vulnerability poses a significant risk. The ability for unauthenticated remote attackers to execute arbitrary code can lead to unauthorized access to sensitive data, manipulation of AI agent behaviors, and potential lateral movement within networks. Organizations relying on AI-driven automation or decision-making tools that incorporate SuperAGI may face data confidentiality breaches and integrity violations, undermining trust in automated processes. Additionally, compromised systems could be leveraged as footholds for further attacks, including espionage or sabotage. Given the increasing adoption of AI frameworks in sectors such as finance, healthcare, manufacturing, and critical infrastructure across Europe, the exploitation of this vulnerability could disrupt operations and violate data protection regulations like GDPR. The medium severity rating suggests that while exploitation is feasible and impactful, it may not immediately lead to full system compromise or widespread outages, but the risk remains substantial.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify all instances of TransformerOptimus SuperAGI in their environments, especially version 0.0.14 or earlier if applicable. Since no official patches are currently available, organizations should implement immediate compensating controls: 1) Restrict network access to systems running SuperAGI to trusted internal networks or VPNs to reduce exposure to remote attackers. 2) Employ strict input validation and sanitization on all agent template configuration inputs before they are processed by the eval_agent_config function, ideally by disabling or replacing the use of eval() with safer parsing methods. 3) Monitor logs and system behavior for unusual activity indicative of code injection attempts. 4) Use application-layer firewalls or runtime application self-protection (RASP) tools to detect and block malicious payloads targeting configuration fields. 5) Engage with the vendor or open-source maintainers to obtain or contribute patches that remove unsafe eval() usage. 6) Implement strict role-based access controls to limit who can modify agent templates, reducing the risk of insider threats or accidental injection. 7) Conduct security reviews and code audits on AI agent configuration handling to prevent similar vulnerabilities in future versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-51472: n/a
Description
Code Injection in AgentTemplate.eval_agent_config in TransformerOptimus SuperAGI 0.0.14 allows remote attackers to execute arbitrary Python code via malicious values in agent template configurations such as the goal, constraints, or instruction field, which are evaluated using eval() without validation during template loading or updates.
AI-Powered Analysis
Technical Analysis
CVE-2025-51472 is a code injection vulnerability identified in the TransformerOptimus SuperAGI software, specifically in the function AgentTemplate.eval_agent_config. This vulnerability arises because the software evaluates certain agent template configuration fields—such as goal, constraints, or instruction—using Python's eval() function without proper input validation or sanitization. Since eval() executes the passed string as Python code, an attacker who can supply malicious values in these configuration fields can execute arbitrary Python code remotely on the affected system. The vulnerability does not require authentication or user interaction, and it can be exploited over the network (AV:N), with low attack complexity (AC:L). The CVSS v3.1 base score is 6.5, indicating a medium severity level. The impact primarily affects confidentiality and integrity, as arbitrary code execution can lead to data leakage or unauthorized modification, but availability impact is not indicated. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability is classified under CWE-77, which relates to improper neutralization of special elements used in a command ('Command Injection'). This vulnerability is critical to address because it allows remote code execution without any authentication, potentially enabling attackers to fully compromise affected systems running vulnerable versions of TransformerOptimus SuperAGI 0.0.14 or similar.
Potential Impact
For European organizations using TransformerOptimus SuperAGI, this vulnerability poses a significant risk. The ability for unauthenticated remote attackers to execute arbitrary code can lead to unauthorized access to sensitive data, manipulation of AI agent behaviors, and potential lateral movement within networks. Organizations relying on AI-driven automation or decision-making tools that incorporate SuperAGI may face data confidentiality breaches and integrity violations, undermining trust in automated processes. Additionally, compromised systems could be leveraged as footholds for further attacks, including espionage or sabotage. Given the increasing adoption of AI frameworks in sectors such as finance, healthcare, manufacturing, and critical infrastructure across Europe, the exploitation of this vulnerability could disrupt operations and violate data protection regulations like GDPR. The medium severity rating suggests that while exploitation is feasible and impactful, it may not immediately lead to full system compromise or widespread outages, but the risk remains substantial.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify all instances of TransformerOptimus SuperAGI in their environments, especially version 0.0.14 or earlier if applicable. Since no official patches are currently available, organizations should implement immediate compensating controls: 1) Restrict network access to systems running SuperAGI to trusted internal networks or VPNs to reduce exposure to remote attackers. 2) Employ strict input validation and sanitization on all agent template configuration inputs before they are processed by the eval_agent_config function, ideally by disabling or replacing the use of eval() with safer parsing methods. 3) Monitor logs and system behavior for unusual activity indicative of code injection attempts. 4) Use application-layer firewalls or runtime application self-protection (RASP) tools to detect and block malicious payloads targeting configuration fields. 5) Engage with the vendor or open-source maintainers to obtain or contribute patches that remove unsafe eval() usage. 6) Implement strict role-based access controls to limit who can modify agent templates, reducing the risk of insider threats or accidental injection. 7) Conduct security reviews and code audits on AI agent configuration handling to prevent similar vulnerabilities in future versions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687ff645a915ff00f7fa9e70
Added to database: 7/22/2025, 8:36:21 PM
Last enriched: 7/22/2025, 8:51:19 PM
Last updated: 9/3/2025, 7:06:05 AM
Views: 572
Related Threats
CVE-2025-58281: CWE-125 Out-of-bounds Read in Huawei HarmonyOS
HighCVE-2025-0285: CWE-1287: Improper Validation of Specified Type of Input in Paragon Software Migrate OS to SSD
HighCVE-2025-38603
LowCVE-2025-58313: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
MediumCVE-2025-58296: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.