Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22038: CWE-532: Insertion of Sensitive Information into Log File in Significant-Gravitas AutoGPT

0
High
VulnerabilityCVE-2026-22038cvecve-2026-22038cwe-532
Published: Wed Feb 04 2026 (02/04/2026, 22:28:20 UTC)
Source: CVE Database V5
Vendor/Project: Significant-Gravitas
Product: AutoGPT

Description

CVE-2026-22038 is a high-severity vulnerability in Significant-Gravitas AutoGPT versions prior to autogpt-platform-beta-v0. 6. 46. The issue involves the insertion of sensitive information, specifically API keys and authentication secrets, into log files in plaintext via logger. info() calls within three Stagehand integration blocks. This exposure can lead to confidentiality breaches and potential denial of service due to availability impact. The vulnerability requires network access and low privileges but no user interaction, making exploitation feasible in many environments. The flaw has been patched in version 0. 6. 46.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:36:37 UTC

Technical Analysis

CVE-2026-22038 is a vulnerability classified under CWE-532, which concerns the insertion of sensitive information into log files. The affected product is AutoGPT by Significant-Gravitas, a platform enabling continuous AI agents to automate workflows. Prior to version autogpt-platform-beta-v0.6.46, the Stagehand integration components (StagehandObserveBlock, StagehandActBlock, StagehandExtractBlock) explicitly call api_key.get_secret_value() and log these secrets using logger.info() statements. This results in API keys and authentication secrets being stored in plaintext within log files, which can be accessed by unauthorized users if log files are improperly secured. The vulnerability has a CVSS 3.1 score of 8.1, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). The exposure of secrets compromises confidentiality and can lead to denial of service if attackers leverage the leaked credentials to disrupt services. Although no known exploits are reported in the wild, the vulnerability presents a significant risk due to the sensitive nature of the logged data and ease of exploitation by insiders or attackers with network access and low privileges. The issue was addressed in autogpt-platform-beta-v0.6.46 by removing or securing the logging of secrets.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to confidentiality and availability. The leakage of API keys and authentication secrets in logs can enable attackers to gain unauthorized access to critical systems, escalate privileges, or disrupt AI-driven automated workflows. Given the increasing reliance on AI platforms like AutoGPT in sectors such as finance, manufacturing, and public services across Europe, exploitation could lead to data breaches, operational downtime, and reputational damage. The availability impact is also significant, as attackers could use leaked credentials to cause denial of service or manipulate AI agents. Organizations with insufficient log management controls or those running vulnerable AutoGPT versions are particularly at risk. The vulnerability's network-based attack vector and lack of required user interaction increase the likelihood of exploitation in multi-tenant or cloud environments common in European enterprises.

Mitigation Recommendations

European organizations should immediately upgrade AutoGPT to version autogpt-platform-beta-v0.6.46 or later to apply the official patch that removes sensitive data from logs. Until patching is complete, restrict access to log files using strict file permissions and monitor logs for any exposure of API keys or secrets. Implement centralized log management with encryption and access controls to prevent unauthorized viewing. Conduct audits to identify any leaked secrets and rotate all potentially exposed API keys and authentication credentials. Employ network segmentation and least privilege principles to limit the impact of compromised credentials. Additionally, review and harden the configuration of AI automation workflows to detect anomalous behavior that could indicate exploitation. Educate developers and operators about secure logging practices to avoid similar issues in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T22:30:38.719Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983cbf5f9fa50a62fb2104b

Added to database: 2/4/2026, 10:45:09 PM

Last enriched: 2/12/2026, 7:36:37 AM

Last updated: 3/22/2026, 8:23:43 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses