Home » Database

AVID-2026-R1645

Description

SSRF Check Bypass in Requests Utility in significant-gravitas/autogpt (CVE-2025-0454)

Details

A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the urlparse function from the urllib.parse library and the requests library. A malicious user can exploit this by submitting a specially crafted URL, such as http://localhost:\@google.com/../, to bypass the SSRF check and perform an SSRF attack.

Reason for inclusion in AVID: The CVE describes a server-side request forgery (SSRF) vulnerability in the Requests utility of significant-gravitas/autogpt, an AI system. This is a software vulnerability within an AI framework/tooling stack used to build/run general-purpose AI systems. It affects the software supply chain for AI deployments (e.g., CI/CD, packaging, and runtime) since it resides in the application’s code path and could be exploited during operation. It is not hardware/firmware-only. The report provides explicit vulnerability behavior, affected versions, CVSS details, and references, supporting clear evidence for classification.

References

Affected or Relevant Artifacts

  • Developer: OpenAI
  • Deployer: OpenAI
  • Artifact Details:
TypeName
Systemsignificant-gravitas/autogpt

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score7.5
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity ImpactNONE
Availability ImpactNONE

CWE

IDDescription
CWE-918CWE-918 Server-Side Request Forgery (SSRF)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry