CVE-2025-62616

9.8 CRITICAL

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in AutoGPT's SendDiscordFileBlock component. Attackers can exploit unfiltered URL inputs to make unauthorized requests to internal systems. Users running AutoGPT versions before beta-v0.6.34 are affected.

💻 Affected Systems

Products:
  • AutoGPT
Versions: All versions prior to autogpt-platform-beta-v0.6.34
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when using SendDiscordFileBlock functionality with untrusted URL inputs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal infrastructure through SSRF to cloud metadata services, internal APIs, or sensitive systems, potentially leading to data exfiltration or lateral movement.

🟠

Likely Case

Unauthorized access to internal HTTP services, port scanning of internal networks, or data leakage from internal endpoints.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, restricting vulnerable component to necessary external services only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to control URL input to SendDiscordFileBlock. No authentication bypass needed beyond access to this functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: autogpt-platform-beta-v0.6.34

Vendor Advisory: https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-ggc4-4fmm-9hmc

Restart Required: Yes

Instructions:

1. Update AutoGPT to version beta-v0.6.34 or later. 2. Restart the AutoGPT service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation Workaround

all

Implement strict URL validation and filtering for SendDiscordFileBlock inputs

# Modify SendDiscordFileBlock to validate URLs before processing
# Example Python validation:
import re
allowed_domains = ['discord.com', 'cdn.discordapp.com']
def validate_url(url):
    from urllib.parse import urlparse
    parsed = urlparse(url)
    return parsed.netloc in allowed_domains and parsed.scheme in ['http', 'https']

🧯 If You Can't Patch

  • Disable SendDiscordFileBlock functionality if not required
  • Implement network egress filtering to restrict outbound connections from AutoGPT to only necessary external services

🔍 How to Verify

Check if Vulnerable:

Check AutoGPT version: if version is earlier than beta-v0.6.34, system is vulnerable.

Check Version:

Check package.json or run: python -c "import autogpt; print(autogpt.__version__)"

Verify Fix Applied:

Confirm version is beta-v0.6.34 or later and test SendDiscordFileBlock with controlled SSRF test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from AutoGPT process to internal IP addresses
  • Multiple failed connection attempts to internal services

Network Indicators:

  • HTTP requests from AutoGPT to non-Discord domains or internal IP ranges
  • Port scanning patterns from AutoGPT host

SIEM Query:

source="autogpt.log" AND (url_contains="169.254.169.254" OR url_contains="metadata.google.internal" OR url_contains="192.168." OR url_contains="10." OR url_contains="172.16.")

🔗 References

📤 Share & Export