CVE-2025-6280
📋 TL;DR
This critical vulnerability in TransformerOptimus SuperAGI allows attackers to perform path traversal attacks via the filename argument in the download_attachment function. This could enable unauthorized file access or manipulation on affected systems. Users of SuperAGI up to version 0.0.14 are affected.
💻 Affected Systems
- TransformerOptimus SuperAGI
📦 What is this software?
Superagi by Superagi
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive system files, write malicious files to arbitrary locations, or potentially achieve remote code execution by overwriting critical files.
Likely Case
Unauthorized access to sensitive files containing configuration data, credentials, or user information stored on the server.
If Mitigated
Limited impact with proper file permission restrictions and input validation in place, though some information disclosure may still occur.
🎯 Exploit Status
Exploit details have been publicly disclosed in GitHub issues, making exploitation straightforward for attackers with access to the vulnerable function.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.0.15 or later
Vendor Advisory: https://github.com/TransformerOptimus/SuperAGI/issues/1466
Restart Required: Yes
Instructions:
1. Check current SuperAGI version
2. Update to version 0.0.15 or later using pip: pip install --upgrade superagi
3. Restart the SuperAGI service
🔧 Temporary Workarounds
Input Validation Enhancement
allAdd filename validation to prevent directory traversal sequences
Modify SuperAGI/superagi/helper/read_email.py to sanitize filename inputs
Disable EmailToolKit
allTemporarily disable the vulnerable EmailToolKit component
Remove or comment out EmailToolKit usage in configuration
🧯 If You Can't Patch
- Implement strict file system permissions to limit accessible directories
- Deploy web application firewall with path traversal protection rules
🔍 How to Verify
Check if Vulnerable:
Check if SuperAGI version is 0.0.14 or earlier and if read_email.py contains the vulnerable download_attachment function
Check Version:
pip show superagi | grep Version
Verify Fix Applied:
Verify SuperAGI version is 0.0.15 or later and check that filename validation has been implemented in read_email.py
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in application logs
- Multiple failed attempts to access files outside expected directories
Network Indicators:
- HTTP requests containing directory traversal sequences (../, ..\) in filename parameters
SIEM Query:
source="superagi.log" AND ("..\" OR "../" OR "%2e%2e") AND filename