We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-0454

SSRF Check Bypass in Requests Utility in significant-gravitas/autogpt



Description

A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the `urlparse` function from the `urllib.parse` library and the `requests` library. A malicious user can exploit this by submitting a specially crafted URL, such as `http://localhost:\@google.com/../`, to bypass the SSRF check and perform an SSRF attack.

Reserved 2025-01-13 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


HIGH: 7.5CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Any version before v0.4.0
affected

References

huntr.com/bounties/0664fdee-bdc2-4650-8075-74d7b8d3e308

github.com/...ommit/ff065cd24c2289878c0abdb9adbf91c305f0d70a

cve.org (CVE-2025-0454)

nvd.nist.gov (CVE-2025-0454)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-0454

Support options

Helpdesk Chat, Email, Knowledgebase