CVE-2025-51475: n/a
Arbitrary File Overwrite (AFO) in superagi.controllers.resources.upload in TransformerOptimus SuperAGI 0.0.14 allows remote attackers to overwrite arbitrary files via unsanitised filenames submitted to the file upload endpoint, due to improper handling of directory traversal in os.path.join() and lack of path validation in get_root_input_dir().
AI Analysis
Technical Summary
CVE-2025-51475 is a critical security vulnerability identified in TransformerOptimus SuperAGI version 0.0.14, specifically within the file upload functionality of the superagi.controllers.resources.upload module. The vulnerability is an Arbitrary File Overwrite (AFO) flaw that arises due to improper handling of directory traversal sequences in the filename parameter submitted to the file upload endpoint. The root cause lies in the use of os.path.join() without adequate sanitization and the absence of path validation in the get_root_input_dir() function. This allows a remote attacker to craft malicious filenames containing directory traversal characters (e.g., '../') that bypass the intended directory restrictions, enabling overwriting of arbitrary files on the server's filesystem. Such an exploit can lead to overwriting critical system or application files, potentially resulting in code execution, denial of service, or data corruption. The vulnerability does not require authentication or user interaction, making it exploitable remotely by unauthenticated attackers. Although no known exploits are currently reported in the wild, the nature of the flaw and its ease of exploitation make it a significant threat to affected deployments. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending further assessment, but the technical details strongly suggest a high-risk severity.
Potential Impact
For European organizations using TransformerOptimus SuperAGI 0.0.14, this vulnerability poses a substantial risk to confidentiality, integrity, and availability of their systems. Successful exploitation could allow attackers to overwrite configuration files, application binaries, or sensitive data, potentially leading to unauthorized code execution, system compromise, or service disruption. This is particularly concerning for organizations relying on SuperAGI for automation, AI workflows, or critical business processes. The ability to overwrite arbitrary files without authentication increases the attack surface and the likelihood of targeted attacks against European enterprises. Additionally, regulatory frameworks such as GDPR impose strict requirements on data protection and incident response; a breach resulting from this vulnerability could lead to significant legal and financial repercussions. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability's characteristics warrant immediate attention to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2025-51475, European organizations should implement the following specific measures: 1) Immediately upgrade TransformerOptimus SuperAGI to a patched version once available from the vendor; 2) In the interim, apply custom input validation on the file upload endpoint to reject filenames containing directory traversal sequences or suspicious characters; 3) Employ strict server-side path normalization and enforce whitelist-based directory constraints to ensure uploaded files cannot escape designated directories; 4) Restrict file system permissions for the application process to minimize the impact of potential overwrites, ensuring it cannot modify critical system or application files; 5) Monitor logs for anomalous file upload activities and implement intrusion detection rules targeting directory traversal patterns; 6) Conduct thorough code reviews and penetration testing focused on file handling components; 7) Isolate SuperAGI deployments within segmented network zones to limit lateral movement in case of compromise. These targeted actions go beyond generic advice and address the specific exploitation vectors of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-51475: n/a
Description
Arbitrary File Overwrite (AFO) in superagi.controllers.resources.upload in TransformerOptimus SuperAGI 0.0.14 allows remote attackers to overwrite arbitrary files via unsanitised filenames submitted to the file upload endpoint, due to improper handling of directory traversal in os.path.join() and lack of path validation in get_root_input_dir().
AI-Powered Analysis
Technical Analysis
CVE-2025-51475 is a critical security vulnerability identified in TransformerOptimus SuperAGI version 0.0.14, specifically within the file upload functionality of the superagi.controllers.resources.upload module. The vulnerability is an Arbitrary File Overwrite (AFO) flaw that arises due to improper handling of directory traversal sequences in the filename parameter submitted to the file upload endpoint. The root cause lies in the use of os.path.join() without adequate sanitization and the absence of path validation in the get_root_input_dir() function. This allows a remote attacker to craft malicious filenames containing directory traversal characters (e.g., '../') that bypass the intended directory restrictions, enabling overwriting of arbitrary files on the server's filesystem. Such an exploit can lead to overwriting critical system or application files, potentially resulting in code execution, denial of service, or data corruption. The vulnerability does not require authentication or user interaction, making it exploitable remotely by unauthenticated attackers. Although no known exploits are currently reported in the wild, the nature of the flaw and its ease of exploitation make it a significant threat to affected deployments. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending further assessment, but the technical details strongly suggest a high-risk severity.
Potential Impact
For European organizations using TransformerOptimus SuperAGI 0.0.14, this vulnerability poses a substantial risk to confidentiality, integrity, and availability of their systems. Successful exploitation could allow attackers to overwrite configuration files, application binaries, or sensitive data, potentially leading to unauthorized code execution, system compromise, or service disruption. This is particularly concerning for organizations relying on SuperAGI for automation, AI workflows, or critical business processes. The ability to overwrite arbitrary files without authentication increases the attack surface and the likelihood of targeted attacks against European enterprises. Additionally, regulatory frameworks such as GDPR impose strict requirements on data protection and incident response; a breach resulting from this vulnerability could lead to significant legal and financial repercussions. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability's characteristics warrant immediate attention to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2025-51475, European organizations should implement the following specific measures: 1) Immediately upgrade TransformerOptimus SuperAGI to a patched version once available from the vendor; 2) In the interim, apply custom input validation on the file upload endpoint to reject filenames containing directory traversal sequences or suspicious characters; 3) Employ strict server-side path normalization and enforce whitelist-based directory constraints to ensure uploaded files cannot escape designated directories; 4) Restrict file system permissions for the application process to minimize the impact of potential overwrites, ensuring it cannot modify critical system or application files; 5) Monitor logs for anomalous file upload activities and implement intrusion detection rules targeting directory traversal patterns; 6) Conduct thorough code reviews and penetration testing focused on file handling components; 7) Isolate SuperAGI deployments within segmented network zones to limit lateral movement in case of compromise. These targeted actions go beyond generic advice and address the specific exploitation vectors of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687fe6fca83201eaac205b9d
Added to database: 7/22/2025, 7:31:08 PM
Last enriched: 7/22/2025, 7:46:08 PM
Last updated: 7/22/2025, 8:04:58 PM
Views: 3
Related Threats
CVE-2025-7486: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motovnet Ebook Store
MediumCVE-2025-51458: n/a
UnknownCVE-2025-31513: n/a
UnknownCVE-2025-31512: n/a
UnknownCVE-2025-31511: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.