First published: Thu Nov 16 2023(Updated: )
SuperAGI v0.0.13 was discovered to use a hardcoded key for encryption operations. This vulnerability can lead to the disclosure of information and communications.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Superagi Superagi | =0.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the SuperAGI v0.0.13 vulnerability is CVE-2023-48055.
The severity of CVE-2023-48055 is high with a CVSS score of 7.5.
The SuperAGI v0.0.13 vulnerability involves the use of a hardcoded key for encryption operations.
The potential consequences of CVE-2023-48055 include the disclosure of information and communications.
The SuperAGI v0.0.13 vulnerability affects version 0.0.13 of the SuperAGI software.
To fix CVE-2023-48055, it is recommended to update to a version of SuperAGI that does not use a hardcoded key for encryption operations, if available.
Yes, you can find additional information about CVE-2023-48055 at the following reference: [https://gxx777.github.io/SuperAGI_v0.0.13_Cryptographic_API_Misuse_Vulnerability.md](https://gxx777.github.io/SuperAGI_v0.0.13_Cryptographic_API_Misuse_Vulnerability.md)