Cyber Posture

CVE-2024-8156

CriticalPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
15 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0161 81.9th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2024-8156 is a command injection vulnerability (CWE-77) in the workflow-checker.yml workflow of the significant-gravitas/autogpt GitHub repository. The issue arises from the insecure use of untrusted user input from `github.head.ref`, which allows arbitrary command injection. This affects versions up to and including the latest version, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

An unauthenticated remote attacker can exploit the vulnerability by creating a GitHub branch name containing a malicious payload and opening a pull request to the repository. Successful exploitation enables arbitrary command execution, potentially leading to reverse shell access or theft of sensitive tokens and keys.

A patch addressing the vulnerability is available in commit 1df7d527dd37dff8363dc162fb58d300f072e302 at https://github.com/significant-gravitas/autogpt/commit/1df7d527dd37dff8363dc162fb58d300f072e302. Further details are provided on the Huntr bounty page at https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51.

AutoGPT is an AI agent framework, highlighting the vulnerability's relevance to AI/ML repositories relying on GitHub Actions workflows.

Details

CWE(s)
CWE-77

Affected Products

agpt
autogpt classic
≤ 0.5.1

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability is an unauthenticated command injection in a public GitHub Actions workflow triggered by PRs, directly enabling exploitation of public-facing applications (T1190) and arbitrary command execution on Unix-based runners (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References