Cyber Posture

CVE-2026-24780

HighPublic PoCRCE

Published: 29 January 2026

Published
29 January 2026
Modified
17 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24780 is a high-severity Code Injection (CWE-94) vulnerability in Agpt Autogpt Platform. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as APIs and Models.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces authorization checks on block execution endpoints to prevent authenticated users from invoking disabled blocks like BlockInstallationBlock that enable remote code execution.

prevent

Applies least privilege to restrict low-privileged authenticated users from accessing and executing high-risk blocks capable of writing and running arbitrary Python code.

prevent

Mandates timely flaw remediation by patching to autogpt-platform-beta-v0.6.44 or later, which implements the missing disabled flag verification.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

The vulnerability allows low-privileged authenticated attackers to exploit a public-facing web API endpoint for remote code execution by invoking a disabled block that writes and executes arbitrary Python code.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.44, AutoGPT Platform's block execution endpoints (both main web API and external API) allow executing blocks by UUID…

more

without checking the `disabled` flag. Any authenticated user can execute the disabled `BlockInstallationBlock`, which writes arbitrary Python code to the server filesystem and executes it via `__import__()`, achieving Remote Code Execution. In default self-hosted deployments where Supabase signup is enabled, an attacker can self-register; if signup is disabled (e.g., hosted), the attacker needs an existing account. autogpt-platform-beta-v0.6.44 contains a fix.

Deeper analysisAI

CVE-2026-24780 affects the AutoGPT Platform, a system for creating, deploying, and managing continuous artificial intelligence agents that automate complex workflows. In versions prior to autogpt-platform-beta-v0.6.44, the block execution endpoints in both the main web API and external API permit execution of blocks identified by UUID without verifying the `disabled` flag. This flaw allows authenticated users to invoke the disabled `BlockInstallationBlock`, which writes arbitrary Python code to the server filesystem and executes it using `__import__()`, resulting in remote code execution. The vulnerability is classified under CWE-94 (code injection), CWE-276 (incorrect default permissions), and CWE-863 (incorrect authorization).

Any low-privileged authenticated user can exploit this vulnerability over the network with low complexity and no user interaction required. In default self-hosted deployments where Supabase signup is enabled, attackers can self-register an account to gain authentication. If signup is disabled, such as in hosted environments, an existing account is necessary. Successful exploitation grants attackers full remote code execution on the server, enabling high confidentiality, integrity, and availability impacts as reflected in the CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

The provided GitHub references point to the vulnerable code in routes.py, features/v1.py, block.py, and data/block.py, illustrating the lack of disabled flag checks and the BlockInstallationBlock implementation. Mitigation requires upgrading to autogpt-platform-beta-v0.6.44 or later, which addresses the issue by enforcing proper checks on disabled blocks.

This vulnerability is particularly relevant in AI/ML contexts, as AutoGPT Platform is designed for deploying autonomous AI agents, potentially amplifying risks in environments automating sensitive workflows. No public evidence of real-world exploitation is available at this time.

Details

CWE(s)

Affected Products

agpt
autogpt platform
0.1.0 — 0.6.44

AI Security AnalysisAI

AI Category
APIs and Models
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: artificial intelligence

CVEs Like This One

CVE-2026-26020Same product: Agpt Autogpt Platform
CVE-2025-62616Same product: Agpt Autogpt Platform
CVE-2025-62615Same product: Agpt Autogpt Platform
CVE-2026-22038Same product: Agpt Autogpt Platform
CVE-2025-0454Same product: Agpt Autogpt Platform
CVE-2025-1040Same product: Agpt Autogpt Platform
CVE-2025-22603Same product: Agpt Autogpt Platform
CVE-2024-8156Same vendor: Agpt
CVE-2026-3409Shared CWE-94
CVE-2026-5631Shared CWE-94

References