CVE-2026-22038

8.1 HIGH

📋 TL;DR

AutoGPT versions before beta-v0.6.46 log API keys and authentication secrets in plaintext when using Stagehand integration blocks. This exposes sensitive credentials to anyone with access to logs, affecting all users of vulnerable AutoGPT deployments.

💻 Affected Systems

Products:
  • AutoGPT
Versions: All versions prior to autogpt-platform-beta-v0.6.46
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using Stagehand integration blocks (StagehandObserveBlock, StagehandActBlock, StagehandExtractBlock).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to logs containing API keys and authentication secrets, enabling unauthorized access to integrated services, data exfiltration, and account takeover.

🟠

Likely Case

Internal users or administrators with log access inadvertently expose credentials, leading to accidental credential leakage and potential misuse.

🟢

If Mitigated

With proper log access controls and monitoring, exposure is limited to authorized personnel only, reducing risk of credential compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to logs where credentials are stored in plaintext. No special tools or techniques needed beyond log access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: autogpt-platform-beta-v0.6.46

Vendor Advisory: https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-rc89-6g7g-v5v7

Restart Required: Yes

Instructions:

1. Update AutoGPT to version beta-v0.6.46 or later. 2. Restart the AutoGPT service. 3. Verify logs no longer contain plaintext API keys.

🔧 Temporary Workarounds

Disable Stagehand Integration

all

Temporarily disable Stagehand integration blocks to prevent credential logging.

Modify AutoGPT configuration to remove or disable StagehandObserveBlock, StagehandActBlock, and StagehandExtractBlock

Restrict Log Access

linux

Implement strict access controls on log files and monitoring systems.

chmod 600 /path/to/autogpt/logs
setfacl -m u:autogpt:r /path/to/autogpt/logs

🧯 If You Can't Patch

  • Implement strict access controls on log storage and monitoring systems
  • Rotate all API keys and authentication secrets that may have been exposed in logs

🔍 How to Verify

Check if Vulnerable:

Check AutoGPT logs for plaintext API keys or secrets when Stagehand blocks are used. Look for logger.info() statements containing get_secret_value() output.

Check Version:

Check AutoGPT version in configuration or via platform interface

Verify Fix Applied:

After patching, verify that logs no longer contain plaintext API keys when using Stagehand integration blocks.

📡 Detection & Monitoring

Log Indicators:

  • Plaintext API keys or authentication secrets in log entries
  • logger.info() statements containing get_secret_value() output

Network Indicators:

  • Unusual API calls from log storage systems
  • Unauthorized access attempts using credentials found in logs

SIEM Query:

source="autogpt_logs" AND "get_secret_value" AND "logger.info"

🔗 References

📤 Share & Export