Praison

Praisonai

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.01%
  • Veröffentlicht 09.04.2026 22:16:35
  • Zuletzt bearbeitet 20.04.2026 19:53:38

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/approval/allow-list endpoint permits unauthenticated modification of the tool approval allowlist when no auth_token is configured (the default). By adding dangerous tool na...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 09.04.2026 22:16:35
  • Zuletzt bearbeitet 17.04.2026 17:38:43

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the _safe_extractall() function in PraisonAI's recipe registry validates archive members against path traversal attacks but performs no checks on individual member sizes, cumulative extracted...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 09.04.2026 22:16:35
  • Zuletzt bearbeitet 17.04.2026 18:33:22

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenticat...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.04.2026 22:16:35
  • Zuletzt bearbeitet 17.04.2026 18:34:53

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the WSGI-based recipe registry server (server.py) reads the entire HTTP request body into memory based on the client-supplied Content-Length header with no upper bound. Combined with authenti...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 09.04.2026 22:16:35
  • Zuletzt bearbeitet 17.04.2026 18:36:03

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST reque...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 09.04.2026 22:16:34
  • Zuletzt bearbeitet 17.04.2026 19:36:56

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoint in src/praisonai/api.py renders agent output as HTML without effective sanitization. The _sanitize_html function relies on the nh3 library, which is not listed as a req...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.04.2026 22:16:34
  • Zuletzt bearbeitet 17.04.2026 19:35:27

PraisonAI is a multi-agent teams system. Prior to 4.5.128, deploy.py constructs a single comma-delimited string for the gcloud run deploy --set-env-vars argument by directly interpolating openai_model, openai_key, and openai_base without validating t...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 09.04.2026 20:16:27
  • Zuletzt bearbeitet 16.04.2026 20:40:45

PraisonAI is a multi-agent teams system. Prior to 4.5.121, the execute_command function and workflow shell execution are exposed to user-controlled input via agent workflows, YAML definitions, and LLM-generated tool calls, allowing attackers to injec...

  • EPSS 0.29%
  • Veröffentlicht 08.04.2026 20:45:30
  • Zuletzt bearbeitet 15.04.2026 17:56:13

PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.loadAgentFromFile method uses the js-yaml library to parse YAML files without disabling dangerous tags (such as !!js/function and !!js/undefined). This allows an attacker to ...

  • EPSS 0.04%
  • Veröffentlicht 08.04.2026 20:44:24
  • Zuletzt bearbeitet 15.04.2026 17:57:38

PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentication. The create_a2u_routes() function registers the following endpoints with NO authenti...