CVE-2025-51475: n/a
Arbitrary File Overwrite (AFO) in superagi.controllers.resources.upload in TransformerOptimus SuperAGI 0.0.14 allows remote attackers to overwrite arbitrary files via unsanitised filenames submitted to the file upload endpoint, due to improper handling of directory traversal in os.path.join() and lack of path validation in get_root_input_dir().
AI Analysis
Technical Summary
CVE-2025-51475 is a critical security vulnerability identified in TransformerOptimus SuperAGI version 0.0.14, specifically within the file upload functionality of the superagi.controllers.resources.upload module. The vulnerability is an Arbitrary File Overwrite (AFO) flaw that arises due to improper handling of directory traversal sequences in the filename parameter submitted to the file upload endpoint. The root cause lies in the use of os.path.join() without adequate sanitization and the absence of path validation in the get_root_input_dir() function. This allows a remote attacker to craft malicious filenames containing directory traversal characters (e.g., '../') that bypass the intended directory restrictions, enabling overwriting of arbitrary files on the server's filesystem. Such an exploit can lead to overwriting critical system or application files, potentially resulting in code execution, denial of service, or data corruption. The vulnerability does not require authentication or user interaction, making it exploitable remotely by unauthenticated attackers. Although no known exploits are currently reported in the wild, the nature of the flaw and its ease of exploitation make it a significant threat to affected deployments. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending further assessment, but the technical details strongly suggest a high-risk severity.
Potential Impact
For European organizations using TransformerOptimus SuperAGI 0.0.14, this vulnerability poses a substantial risk to confidentiality, integrity, and availability of their systems. Successful exploitation could allow attackers to overwrite configuration files, application binaries, or sensitive data, potentially leading to unauthorized code execution, system compromise, or service disruption. This is particularly concerning for organizations relying on SuperAGI for automation, AI workflows, or critical business processes. The ability to overwrite arbitrary files without authentication increases the attack surface and the likelihood of targeted attacks against European enterprises. Additionally, regulatory frameworks such as GDPR impose strict requirements on data protection and incident response; a breach resulting from this vulnerability could lead to significant legal and financial repercussions. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability's characteristics warrant immediate attention to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2025-51475, European organizations should implement the following specific measures: 1) Immediately upgrade TransformerOptimus SuperAGI to a patched version once available from the vendor; 2) In the interim, apply custom input validation on the file upload endpoint to reject filenames containing directory traversal sequences or suspicious characters; 3) Employ strict server-side path normalization and enforce whitelist-based directory constraints to ensure uploaded files cannot escape designated directories; 4) Restrict file system permissions for the application process to minimize the impact of potential overwrites, ensuring it cannot modify critical system or application files; 5) Monitor logs for anomalous file upload activities and implement intrusion detection rules targeting directory traversal patterns; 6) Conduct thorough code reviews and penetration testing focused on file handling components; 7) Isolate SuperAGI deployments within segmented network zones to limit lateral movement in case of compromise. These targeted actions go beyond generic advice and address the specific exploitation vectors of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-51475: n/a
Description
Arbitrary File Overwrite (AFO) in superagi.controllers.resources.upload in TransformerOptimus SuperAGI 0.0.14 allows remote attackers to overwrite arbitrary files via unsanitised filenames submitted to the file upload endpoint, due to improper handling of directory traversal in os.path.join() and lack of path validation in get_root_input_dir().
AI-Powered Analysis
Technical Analysis
CVE-2025-51475 is a critical security vulnerability identified in TransformerOptimus SuperAGI version 0.0.14, specifically within the file upload functionality of the superagi.controllers.resources.upload module. The vulnerability is an Arbitrary File Overwrite (AFO) flaw that arises due to improper handling of directory traversal sequences in the filename parameter submitted to the file upload endpoint. The root cause lies in the use of os.path.join() without adequate sanitization and the absence of path validation in the get_root_input_dir() function. This allows a remote attacker to craft malicious filenames containing directory traversal characters (e.g., '../') that bypass the intended directory restrictions, enabling overwriting of arbitrary files on the server's filesystem. Such an exploit can lead to overwriting critical system or application files, potentially resulting in code execution, denial of service, or data corruption. The vulnerability does not require authentication or user interaction, making it exploitable remotely by unauthenticated attackers. Although no known exploits are currently reported in the wild, the nature of the flaw and its ease of exploitation make it a significant threat to affected deployments. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending further assessment, but the technical details strongly suggest a high-risk severity.
Potential Impact
For European organizations using TransformerOptimus SuperAGI 0.0.14, this vulnerability poses a substantial risk to confidentiality, integrity, and availability of their systems. Successful exploitation could allow attackers to overwrite configuration files, application binaries, or sensitive data, potentially leading to unauthorized code execution, system compromise, or service disruption. This is particularly concerning for organizations relying on SuperAGI for automation, AI workflows, or critical business processes. The ability to overwrite arbitrary files without authentication increases the attack surface and the likelihood of targeted attacks against European enterprises. Additionally, regulatory frameworks such as GDPR impose strict requirements on data protection and incident response; a breach resulting from this vulnerability could lead to significant legal and financial repercussions. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability's characteristics warrant immediate attention to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2025-51475, European organizations should implement the following specific measures: 1) Immediately upgrade TransformerOptimus SuperAGI to a patched version once available from the vendor; 2) In the interim, apply custom input validation on the file upload endpoint to reject filenames containing directory traversal sequences or suspicious characters; 3) Employ strict server-side path normalization and enforce whitelist-based directory constraints to ensure uploaded files cannot escape designated directories; 4) Restrict file system permissions for the application process to minimize the impact of potential overwrites, ensuring it cannot modify critical system or application files; 5) Monitor logs for anomalous file upload activities and implement intrusion detection rules targeting directory traversal patterns; 6) Conduct thorough code reviews and penetration testing focused on file handling components; 7) Isolate SuperAGI deployments within segmented network zones to limit lateral movement in case of compromise. These targeted actions go beyond generic advice and address the specific exploitation vectors of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687fe6fca83201eaac205b9d
Added to database: 7/22/2025, 7:31:08 PM
Last enriched: 7/22/2025, 7:46:08 PM
Last updated: 10/21/2025, 4:54:24 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62702: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - PageTriage Extension
MediumCVE-2025-62696: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in The Wikimedia Foundation Mediawiki Foundation - Springboard Extension
MediumCVE-2025-62694: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - WikiLove Extension
MediumCVE-2025-62695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - WikiLambda Extension
MediumCVE-2025-62699: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in The Wikimedia Foundation Mediawiki - CheckUser Extension
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.