Cyber Posture

CVE-2024-8156

CriticalPublic PoCRCE

Published: 20 March 2025

Published
20 March 2025
Modified
15 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0161 81.9th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-8156 is a critical-severity Command Injection (CWE-77) vulnerability in Agpt Autogpt Classic. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 18.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates command injection by requiring validation and sanitization of untrusted inputs like github.head.ref before use in workflow commands.

prevent

Ensures timely remediation of known flaws such as CVE-2024-8156 through patching the vulnerable workflow-checker.yml as provided in the referenced commit.

prevent

Enforces secure configuration settings for GitHub Actions workflows to safely handle untrusted PR branch names and prevent insecure command execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability is an unauthenticated command injection in a public GitHub Actions workflow triggered by PRs, directly enabling exploitation of public-facing applications (T1190) and arbitrary command execution on Unix-based runners (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A command injection vulnerability exists in the workflow-checker.yml workflow of significant-gravitas/autogpt. The untrusted user input `github.head.ref` is used insecurely, allowing an attacker to inject arbitrary commands. This vulnerability affects versions up to and including the latest version. An attacker can…

more

exploit this by creating a branch name with a malicious payload and opening a pull request, potentially leading to reverse shell access or theft of sensitive tokens and keys.

Deeper analysisAI

CVE-2024-8156 is a command injection vulnerability (CWE-77) in the workflow-checker.yml workflow of the significant-gravitas/autogpt GitHub repository. The issue arises from the insecure use of untrusted user input from `github.head.ref`, which allows arbitrary command injection. This affects versions up to and including the latest version, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

An unauthenticated remote attacker can exploit the vulnerability by creating a GitHub branch name containing a malicious payload and opening a pull request to the repository. Successful exploitation enables arbitrary command execution, potentially leading to reverse shell access or theft of sensitive tokens and keys.

A patch addressing the vulnerability is available in commit 1df7d527dd37dff8363dc162fb58d300f072e302 at https://github.com/significant-gravitas/autogpt/commit/1df7d527dd37dff8363dc162fb58d300f072e302. Further details are provided on the Huntr bounty page at https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51.

AutoGPT is an AI agent framework, highlighting the vulnerability's relevance to AI/ML repositories relying on GitHub Actions workflows.

Details

CWE(s)

Affected Products

agpt
autogpt classic
≤ 0.5.1

CVEs Like This One

CVE-2025-29228Shared CWE-77
CVE-2025-52690Shared CWE-77
CVE-2025-14756Shared CWE-77
CVE-2026-3518Shared CWE-77
CVE-2024-43028Shared CWE-77
CVE-2024-12992Shared CWE-77
CVE-2026-22623Shared CWE-77
CVE-2024-57539Shared CWE-77
CVE-2026-41304Shared CWE-77
CVE-2025-22962Shared CWE-77

References