CVE-2026-40313
- EPSS 0.03%
- Veröffentlicht 14.04.2026 03:10:23
- Zuletzt bearbeitet 20.04.2026 17:39:52
PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false. B...
CVE-2026-40289
- EPSS 0.06%
- Veröffentlicht 14.04.2026 03:05:05
- Zuletzt bearbeitet 20.04.2026 17:46:45
PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication and a...
CVE-2026-40288
- EPSS 0.07%
- Veröffentlicht 14.04.2026 03:00:21
- Zuletzt bearbeitet 20.04.2026 17:47:03
PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run <file....
CVE-2026-40287
- EPSS 0.02%
- Veröffentlicht 14.04.2026 02:55:38
- Zuletzt bearbeitet 20.04.2026 17:47:31
PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerable to arbitrary code execution through automatic, unsanitized import of a tools.py file from the current working directory. Components including call.py (import_tools_fro...
CVE-2026-40315
- EPSS 0.02%
- Veröffentlicht 14.04.2026 02:45:33
- Zuletzt bearbeitet 20.04.2026 17:38:54
PraisonAI is a multi-agent teams system. Prior to 4.5.133, there is an SQL identifier injection vulnerability in SQLiteConversationStore where the table_prefix configuration value is directly concatenated into SQL queries via f-strings without any va...
CVE-2026-40159
- EPSS 0.02%
- Veröffentlicht 10.04.2026 16:57:11
- Zuletzt bearbeitet 20.04.2026 18:33:49
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI’s MCP (Model Context Protocol) integration allows spawning background servers via stdio using user-supplied command strings (e.g., MCP("npx -y @smithery/cli ...")). These commands a...
CVE-2026-40158
- EPSS 0.03%
- Veröffentlicht 10.04.2026 16:49:24
- Zuletzt bearbeitet 20.04.2026 19:38:25
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct func...
CVE-2026-40156
- EPSS 0.02%
- Veröffentlicht 10.04.2026 16:46:15
- Zuletzt bearbeitet 20.04.2026 19:56:07
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI automatically loads a file named tools.py from the current working directory to discover and register custom agent tools. This loading process uses importlib.util.spec_from_file_loc...
CVE-2026-40154
- EPSS 0.03%
- Veröffentlicht 09.04.2026 22:16:36
- Zuletzt bearbeitet 15.04.2026 18:56:45
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remotely fetched template files as trusted executable code without integrity verification, origin validation, or user confirmation, enabling supply chain attacks through mali...
CVE-2026-40151
- EPSS 0.03%
- Veröffentlicht 09.04.2026 22:16:36
- Zuletzt bearbeitet 20.04.2026 18:33:18
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the AgentOS deployment platform exposes a GET /api/agents endpoint that returns agent names, roles, and the first 100 characters of agent system instructions to any unauthenticated caller. Th...