CVE-2025-32393

6.5 MEDIUM

📋 TL;DR

AutoGPT versions before beta-v0.6.32 contain a denial-of-service vulnerability in the ReadRSSFeedBlock component. Attackers can trigger resource exhaustion by feeding specially crafted XML to the RSS parser, causing memory exhaustion and service disruption. This affects all AutoGPT deployments using vulnerable versions.

💻 Affected Systems

Products:
  • AutoGPT Platform
Versions: All versions prior to autogpt-platform-beta-v0.6.32
Operating Systems: All platforms running AutoGPT
Default Config Vulnerable: ⚠️ Yes
Notes: Any AutoGPT deployment using RSSBlock functionality is vulnerable. The vulnerability is in the feed parsing component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage due to memory exhaustion, potentially affecting all AutoGPT agents and workflows running on the system.

🟠

Likely Case

Service degradation or temporary unavailability of AutoGPT agents when targeted with malicious RSS feeds.

🟢

If Mitigated

Minimal impact with proper input validation and resource limits in place.

🌐 Internet-Facing: HIGH - RSS feeds are typically fetched from external sources, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal users could still exploit the vulnerability, but attack surface is reduced compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting malicious XML content but does not require authentication. The advisory provides technical details that could facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: autogpt-platform-beta-v0.6.32

Vendor Advisory: https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-5cqw-g779-9f9x

Restart Required: Yes

Instructions:

1. Update AutoGPT to version beta-v0.6.32 or later. 2. Restart all AutoGPT services. 3. Verify the update by checking the version.

🔧 Temporary Workarounds

Disable RSSBlock functionality

all

Temporarily disable or remove RSSBlock from AutoGPT workflows to prevent exploitation.

Modify AutoGPT configuration to remove or disable RSSBlock components

Implement network restrictions

all

Restrict RSS feed sources to trusted domains only.

Configure firewall rules to limit RSS feed fetching to approved sources

🧯 If You Can't Patch

  • Implement strict input validation and size limits on RSS feed content
  • Monitor system memory usage and implement automatic restart thresholds for AutoGPT services

🔍 How to Verify

Check if Vulnerable:

Check AutoGPT version. If version is earlier than beta-v0.6.32 and RSSBlock is enabled, the system is vulnerable.

Check Version:

Check AutoGPT configuration files or run 'pip show autogpt-platform' for version information

Verify Fix Applied:

Verify AutoGPT version is beta-v0.6.32 or later and test RSS functionality with various feed inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusually large RSS feed parsing operations
  • Memory exhaustion errors in AutoGPT logs
  • Repeated RSS parsing failures

Network Indicators:

  • Requests to unusual or suspicious RSS feed URLs
  • Large XML payloads being fetched

SIEM Query:

source="autogpt.logs" AND ("memory" OR "resource" OR "exhaustion") AND "RSS"

🔗 References

📤 Share & Export