Home

Description

AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. Versions 0.6.36 through 0.6.50 are vulnerable to Authenticated Session Hijacking via IDOR. If an authenticated attacker can determine the session_id of another user's session, they can take it over, reading any messages in it and locking the legitimate user out. The PATCH /sessions/{session_id}/assign-user endpoint authenticates the caller but never verifies session ownership: the service layer invokes the session lookup with user_id=None, which the data access layer interprets as a privileged/system call that bypasses the ownership filter, allowing any authenticated user to reassign an arbitrary session to themselves. This issue has been patched in version 0.6.51.

PUBLISHED Reserved 2026-03-07 | Published 2026-05-18 | Updated 2026-05-19 | Assigner GitHub_M




HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L

Problem types

CWE-862: Missing Authorization

Product status

>= 0.6.36, < 0.6.51
affected

References

github.com/...utoGPT/security/advisories/GHSA-q58p-v9r9-7gqj exploit

github.com/...utoGPT/security/advisories/GHSA-q58p-v9r9-7gqj

github.com/...ommit/eca7b5e79370c34ed75e80badb824023d7d8629d

cve.org (CVE-2026-30950)

nvd.nist.gov (CVE-2026-30950)

Download JSON