CVE-2026-40149
- EPSS 0.01%
- Veröffentlicht 09.04.2026 22:16:35
- Zuletzt bearbeitet 20.04.2026 19:53:38
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/approval/allow-list endpoint permits unauthenticated modification of the tool approval allowlist when no auth_token is configured (the default). By adding dangerous tool na...
CVE-2026-40148
- EPSS 0.03%
- Veröffentlicht 09.04.2026 22:16:35
- Zuletzt bearbeitet 17.04.2026 17:38:43
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the _safe_extractall() function in PraisonAI's recipe registry validates archive members against path traversal attacks but performs no checks on individual member sizes, cumulative extracted...
CVE-2026-40116
- EPSS 0.04%
- Veröffentlicht 09.04.2026 22:16:35
- Zuletzt bearbeitet 17.04.2026 18:33:22
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenticat...
CVE-2026-40115
- EPSS 0.02%
- Veröffentlicht 09.04.2026 22:16:35
- Zuletzt bearbeitet 17.04.2026 18:34:53
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the WSGI-based recipe registry server (server.py) reads the entire HTTP request body into memory based on the client-supplied Content-Length header with no upper bound. Combined with authenti...
- EPSS 0.03%
- Veröffentlicht 09.04.2026 22:16:35
- Zuletzt bearbeitet 17.04.2026 18:36:03
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST reque...
CVE-2026-40112
- EPSS 0.03%
- Veröffentlicht 09.04.2026 22:16:34
- Zuletzt bearbeitet 17.04.2026 19:36:56
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoint in src/praisonai/api.py renders agent output as HTML without effective sanitization. The _sanitize_html function relies on the nh3 library, which is not listed as a req...
CVE-2026-40113
- EPSS 0.02%
- Veröffentlicht 09.04.2026 22:16:34
- Zuletzt bearbeitet 17.04.2026 19:35:27
PraisonAI is a multi-agent teams system. Prior to 4.5.128, deploy.py constructs a single comma-delimited string for the gcloud run deploy --set-env-vars argument by directly interpolating openai_model, openai_key, and openai_base without validating t...
CVE-2026-40088
- EPSS 0.05%
- Veröffentlicht 09.04.2026 20:16:27
- Zuletzt bearbeitet 16.04.2026 20:40:45
PraisonAI is a multi-agent teams system. Prior to 4.5.121, the execute_command function and workflow shell execution are exposed to user-controlled input via agent workflows, YAML definitions, and LLM-generated tool calls, allowing attackers to injec...
CVE-2026-39890
- EPSS 0.29%
- Veröffentlicht 08.04.2026 20:45:30
- Zuletzt bearbeitet 15.04.2026 17:56:13
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.loadAgentFromFile method uses the js-yaml library to parse YAML files without disabling dangerous tags (such as !!js/function and !!js/undefined). This allows an attacker to ...
CVE-2026-39889
- EPSS 0.04%
- Veröffentlicht 08.04.2026 20:44:24
- Zuletzt bearbeitet 15.04.2026 17:57:38
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentication. The create_a2u_routes() function registers the following endpoints with NO authenti...