Report: CVE-2026-33234 - AutoGPT: SendEmailBlock's IP blocklist bypass allows SSRF via user-controlled SM

Report: CVE-2026-33234 - AutoGPT: SendEmailBlock's IP blocklist bypass allows SSRF via user-controlled SM

CVE ID :CVE-2026-33234 Published : May 19, 2026, 12:51 a.m. | 45 minutes ago Description :AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. In versions 0.1.0 through 0.6.51, SendEmailBlock in autogpt_platform/backend/backend/blocks/email_block.py accepts a user-supplied smtp_server (string) and smtp_port (integer) as per-execution block inputs, then passes them directly to Python's smtplib.SMTP() to open a raw TCP connection with no IP address validation. This completely bypasses the platform's hardened SSRF protections in backend/util/request.py — the validate_url_host() function and BLOCKED_IP_NETWORKS blocklist that every other block uses to block connections to private, loopback, link-local, and cloud metadata addresses. An authenticated user on a shared AutoGPT deployment can use this to perform non-blind internal network port scanning and service fingerprinting: smtplib reads the target's TCP banner on connect and embeds it in the exception message, which is persisted as user-visible block output via the execution framework. This issue has been fixed in version 0.6.52. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Published
May 19, 2026
Affected Product: Python
Attack Vector: local
Impact: SSRF