Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62615: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT

0
Critical
VulnerabilityCVE-2025-62615cvecve-2025-62615cwe-918
Published: Wed Feb 04 2026 (02/04/2026, 22:28:37 UTC)
Source: CVE Database V5
Vendor/Project: Significant-Gravitas
Product: AutoGPT

Description

CVE-2025-62615 is a critical Server-Side Request Forgery (SSRF) vulnerability in Significant-Gravitas AutoGPT versions prior to autogpt-platform-beta-v0. 6. 34. The issue arises from the unfiltered use of urllib. request. urlopen in the RSSFeedBlock component, allowing attackers to craft malicious URLs that the server will fetch. This can lead to unauthorized internal network access and potential data exposure. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 score of 9. 3, indicating high impact on confidentiality and integrity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:35:19 UTC

Technical Analysis

CVE-2025-62615 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, discovered in the Significant-Gravitas AutoGPT platform prior to version autogpt-platform-beta-v0.6.34. AutoGPT enables users to deploy continuous AI agents automating complex workflows, making it a critical tool in AI-driven environments. The vulnerability exists in the RSSFeedBlock component where the third-party Python library urllib.request.urlopen is used directly to fetch URLs without proper input validation or filtering. This lack of sanitization allows an attacker to supply a crafted URL that the server will fetch on their behalf, potentially accessing internal or restricted network resources that are not otherwise exposed externally. The SSRF can be exploited remotely without authentication or user interaction, increasing the attack surface. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity and no privileges or user interaction required, but with high impact on confidentiality and integrity. Although no exploits have been observed in the wild yet, the vulnerability poses a significant risk due to the sensitive nature of AI automation workflows and the potential for lateral movement within internal networks. The issue was addressed in version autogpt-platform-beta-v0.6.34 by implementing proper URL input filtering to prevent SSRF attacks.

Potential Impact

For European organizations, the SSRF vulnerability in AutoGPT could lead to unauthorized access to internal systems and sensitive data, potentially exposing confidential AI workflows and proprietary information. Given the critical role of AutoGPT in automating AI agents, exploitation could disrupt business operations, compromise data integrity, and facilitate further attacks such as internal reconnaissance or pivoting to other systems. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale. Organizations in sectors like finance, healthcare, manufacturing, and critical infrastructure that increasingly rely on AI automation are at heightened risk. Additionally, the exposure of internal network resources could violate GDPR and other data protection regulations, leading to legal and financial repercussions.

Mitigation Recommendations

European organizations should immediately upgrade AutoGPT to version autogpt-platform-beta-v0.6.34 or later where the SSRF vulnerability is patched. Until the update is applied, implement strict network egress filtering to restrict outbound HTTP/HTTPS requests from AutoGPT servers to only trusted destinations. Employ web application firewalls (WAFs) with SSRF detection rules to monitor and block suspicious URL requests. Conduct thorough input validation and sanitization on any user-supplied URLs before processing. Isolate AutoGPT instances within segmented network zones with limited access to internal resources. Regularly audit and monitor logs for unusual outbound requests indicative of SSRF exploitation attempts. Finally, educate development and security teams about SSRF risks and secure coding practices to prevent similar issues in future AI automation tools.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.269Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983cbf5f9fa50a62fb2103d

Added to database: 2/4/2026, 10:45:09 PM

Last enriched: 2/12/2026, 7:35:19 AM

Last updated: 3/21/2026, 2:20:35 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses