A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the `urlparse` function from the `urllib.parse` library and the `requests` library. A malicious user can exploit this by submitting a specially crafted URL, such as `http://localhost:\@google.com/../`, to bypass the SSRF check and perform an SSRF attack.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agpt autogpt Platform
|
|
| CPEs | cpe:2.3:a:agpt:autogpt_platform:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Agpt autogpt
|
Agpt autogpt Platform
|
Fri, 01 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agpt
Agpt autogpt |
|
| CPEs | cpe:2.3:a:agpt:autogpt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Agpt
Agpt autogpt |
|
| Metrics |
cvssV3_1
|
Thu, 20 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the `urlparse` function from the `urllib.parse` library and the `requests` library. A malicious user can exploit this by submitting a specially crafted URL, such as `http://localhost:\@google.com/../`, to bypass the SSRF check and perform an SSRF attack. | |
| Title | SSRF Check Bypass in Requests Utility in significant-gravitas/autogpt | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:11:30.365Z
Updated: 2025-03-20T15:22:14.163Z
Reserved: 2025-01-13T23:36:39.819Z
Link: CVE-2025-0454
Updated: 2025-03-20T15:21:00.751Z
Status : Analyzed
Published: 2025-03-20T10:15:53.157
Modified: 2025-08-05T17:04:05.087
Link: CVE-2025-0454
No data.