Vulnerability Description
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.46, the AutoGPT platform's Stagehand integration blocks log API keys and authentication secrets in plaintext using logger.info() statements. This occurs in three separate block implementations (StagehandObserveBlock, StagehandActBlock, and StagehandExtractBlock) where the code explicitly calls api_key.get_secret_value() and logs the result. This issue has been patched in autogpt-platform-beta-v0.6.46.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Agpt | Autogpt Platform | < 0.6.46 |
Related Weaknesses (CWE)
References
- https://github.com/Significant-Gravitas/AutoGPT/commit/1eabc604842fa876c09d69af4Patch
- https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-rc89-6gExploitVendor Advisory
FAQ
What is CVE-2026-22038?
CVE-2026-22038 is a vulnerability with a CVSS score of 8.1 (HIGH). AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.46, the AutoGPT pla...
How severe is CVE-2026-22038?
CVE-2026-22038 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-22038?
Check the references section above for vendor advisories and patch information. Affected products include: Agpt Autogpt Platform.