CVE-2024-9437

SuperAGI version v0.0.14 is vulnerable to an unauthenticated Denial of Service (DoS) attack. The vulnerability exists in the resource upload request, where appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request causes the server to continuously process each character. This leads to excessive resource consumption and renders the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.
CVSS

No CVSS.

References
Link Resource
https://huntr.com/bounties/27404e9c-eb3d-4626-a9d9-8dc1b3295ce0 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:superagi:superagi:0.0.14:*:*:*:*:*:*:*

History

14 Jul 2025, 20:17

Type Values Removed Values Added
References () https://huntr.com/bounties/27404e9c-eb3d-4626-a9d9-8dc1b3295ce0 - () https://huntr.com/bounties/27404e9c-eb3d-4626-a9d9-8dc1b3295ce0 - Exploit, Third Party Advisory
First Time Superagi
Superagi superagi
CPE cpe:2.3:a:superagi:superagi:0.0.14:*:*:*:*:*:*:*

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-14 20:17


NVD link : CVE-2024-9437

Mitre link : CVE-2024-9437


JSON object : View

Products Affected

superagi

  • superagi
CWE
CWE-400

Uncontrolled Resource Consumption