A command injection vulnerability exists in the workflow-checker.yml workflow of significant-gravitas/autogpt. The untrusted user input `github.head.ref` is used insecurely, allowing an attacker to inject arbitrary commands. This vulnerability affects versions up to and including the latest version. An attacker can exploit this by creating a branch name with a malicious payload and opening a pull request, potentially leading to reverse shell access or theft of sensitive tokens and keys.
CVE ID: CVE-2024-8156
CVSS Base Severity: HIGH
CVSS Base Score: 8.8
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vendor: significant-gravitas
Product: significant-gravitas/autogpt
EPSS Score: 0.4% (probability of being exploited)
EPSS Percentile: 59.54% (scored less or equal to compared to others)
EPSS Date: 2025-04-18 (when was this score calculated)