AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. In versions 0.6.34 through 0.6.51, the backend deserializes Redis cache bytes using pickle.loads without integrity/authenticity checks. The write path serializes values with pickle.dumps(...) into Redis and the read path blindly invokes pickle.loads(...) on bytes with no HMAC/signature or strict schema validation gating deserialization. If an attacker can poison a shared-cache key in Redis, arbitrary command execution is possible in the backend container context, affecting confidentiality, integrity, and availability. This issue has been fixed in version 0.6.52.
Metrics
Affected Vendors & Products
References
History
Tue, 19 May 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Significant-gravitas
Significant-gravitas autogpt |
|
| Vendors & Products |
Significant-gravitas
Significant-gravitas autogpt |
Tue, 19 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. In versions 0.6.34 through 0.6.51, the backend deserializes Redis cache bytes using pickle.loads without integrity/authenticity checks. The write path serializes values with pickle.dumps(...) into Redis and the read path blindly invokes pickle.loads(...) on bytes with no HMAC/signature or strict schema validation gating deserialization. If an attacker can poison a shared-cache key in Redis, arbitrary command execution is possible in the backend container context, affecting confidentiality, integrity, and availability. This issue has been fixed in version 0.6.52. | |
| Title | AutoGPT Platform: Remote Code Execution via Unsafe Pickle Deserialization of Redis Cache Entries | |
| Weaknesses | CWE-345 CWE-502 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-19T00:46:49.642Z
Reserved: 2026-03-18T02:42:27.507Z
Link: CVE-2026-33233
No data.
Status : Received
Published: 2026-05-19T02:16:15.840
Modified: 2026-05-19T02:16:15.840
Link: CVE-2026-33233
No data.
OpenCVE Enrichment
Updated: 2026-05-19T02:30:35Z