Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-40088 β€” AI Deep Analysis Summary

CVSS 9.7 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical OS Command Injection flaw in PraisonAI. πŸ“‰ **Consequences**: Attackers can inject arbitrary shell commands via user-controlled inputs, leading to full system compromise.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-78** (OS Command Injection). The `execute_command` function and workflow shell execution expose user inputs directly to the shell without proper sanitization. ⚠️

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **PraisonAI** by Mervin Praison. Specifically versions **before 4.5.121**. πŸ“¦ If you are running an older version, you are vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Full **Remote Code Execution (RCE)**. Hackers gain the same privileges as the application user, allowing them to read, modify, or delete any data on the host system. πŸ”“

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **Low**. CVSS indicates **AV:N** (Network), **AC:L** (Low Complexity), **PR:N** (No Privileges Required). However, **UI:R** suggests User Interaction might be needed for specific triggers. 🎯

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. The `pocs` field is empty. No public Proof-of-Concept (PoC) or wild exploitation scripts are currently available. πŸ•΅οΈβ€β™‚οΈ

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Check your installed PraisonAI version. If it is **< 4.5.121**, you are at risk. Scan for usage of `execute_command` with unsanitized user input in your workflows. πŸ§ͺ

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. Patched in **v4.5.121**. πŸ› οΈ Upgrade immediately to the latest version to mitigate this vulnerability. See GitHub Advisory GHSA-2763-cj5r-c79m.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: If you cannot upgrade, **strictly sanitize** all inputs passed to `execute_command`. Avoid passing user-controlled strings directly to shell execution functions. 🚫

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Score is **High** (C:H, I:H, A:H). Despite no public exploit, the ease of exploitation (Low AC) makes it a prime target. Patch NOW. ⏳