{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T15:15:37.003","vulnerabilities":[{"cve":{"id":"CVE-2024-9439","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:49.077","lastModified":"2025-07-14T20:16:31.710","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SuperAGI is vulnerable to remote code execution in the latest version. The `agent template update` API allows attackers to control certain parameters, which are then fed to the eval function without any sanitization or checks in place. This vulnerability can lead to full system compromise."},{"lang":"es","value":"SuperAGI es vulnerable a la ejecución remota de código en la última versión. La API de actualización de plantilla de agente permite a los atacantes controlar ciertos parámetros, que luego se introducen en la función eval sin ninguna depuración ni comprobación. Esta vulnerabilidad puede comprometer por completo el sistema."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:superagi:superagi:0.0.14:*:*:*:*:*:*:*","matchCriteriaId":"3C63CFCE-4FB2-47EC-A731-8C17458675D3"}]}]}],"references":[{"url":"https://huntr.com/bounties/d710884f-b5ab-4b31-a2e6-e4b38488def1","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}