AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. In versions 0.6.34 through 0.6.51, the backend deserializes Redis cache bytes using pickle.loads without integrity/authenticity checks. The write path serializes values with pickle.dumps(...) into Redis and the read path blindly invokes pickle.loads(...) on bytes with no HMAC/signature or strict schema validation gating deserialization. If an attacker can poison a shared-cache key in Redis, arbitrary command execution is possible in the backend container context, affecting confidentiality, integrity, and availability. This issue has been fixed in version 0.6.52.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 19 May 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Significant-gravitas
Significant-gravitas autogpt |
|
| Vendors & Products |
Significant-gravitas
Significant-gravitas autogpt |
Tue, 19 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. In versions 0.6.34 through 0.6.51, the backend deserializes Redis cache bytes using pickle.loads without integrity/authenticity checks. The write path serializes values with pickle.dumps(...) into Redis and the read path blindly invokes pickle.loads(...) on bytes with no HMAC/signature or strict schema validation gating deserialization. If an attacker can poison a shared-cache key in Redis, arbitrary command execution is possible in the backend container context, affecting confidentiality, integrity, and availability. This issue has been fixed in version 0.6.52. | |
| Title | AutoGPT Platform: Remote Code Execution via Unsafe Pickle Deserialization of Redis Cache Entries | |
| Weaknesses | CWE-345 CWE-502 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-19T00:46:49.642Z
Reserved: 2026-03-18T02:42:27.507Z
Link: CVE-2026-33233
No data.
Status : Received
Published: 2026-05-19T02:16:15.840
Modified: 2026-05-19T02:16:15.840
Link: CVE-2026-33233
No data.
OpenCVE Enrichment
Updated: 2026-05-19T02:30:35Z