Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33234— AutoGPT: SendEmailBlock's IP blocklist bypass allows SSRF via user-controlled SMTP server

CVSS 5.0 · Medium
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-33234

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
AutoGPT: SendEmailBlock's IP blocklist bypass allows SSRF via user-controlled SMTP server
Source: NVD (National Vulnerability Database)
Vulnerability Description
AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. In versions 0.1.0 through 0.6.51, SendEmailBlock in autogpt_platform/backend/backend/blocks/email_block.py accepts a user-supplied smtp_server (string) and smtp_port (integer) as per-execution block inputs, then passes them directly to Python's smtplib.SMTP() to open a raw TCP connection with no IP address validation. This completely bypasses the platform's hardened SSRF protections in backend/util/request.py — the validate_url_host() function and BLOCKED_IP_NETWORKS blocklist that every other block uses to block connections to private, loopback, link-local, and cloud metadata addresses. An authenticated user on a shared AutoGPT deployment can use this to perform non-blind internal network port scanning and service fingerprinting: smtplib reads the target's TCP banner on connect and embeds it in the exception message, which is persisted as user-visible block output via the execution framework. This issue has been fixed in version 0.6.52.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Significant-GravitasAutoGPT >= 0.1.0, < 0.6.52 -

II. Public POCs for CVE-2026-33234

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-33234

登录查看更多情报信息。

Same Patch Batch · Significant-Gravitas · 2026-05-19 · 3 CVEs total

CVE-2026-332337.6 HIGHAutoGPT Platform: Remote Code Execution via Unsafe Pickle Deserialization of Redis Cache E
CVE-2026-332327.5 HIGHAutoGPT: Unauthenticated DoS via Disk Space Exhaustion

IV. Related Vulnerabilities

V. Comments for CVE-2026-33234

No comments yet


Leave a comment