Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| MervinPraison | PraisonAI | < 4.5.121 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
| CVE-2026-40154 | 9.3 CRITICAL | PraisonAI Affected by Untrusted Remote Template Code Execution |
| CVE-2026-40113 | 8.4 HIGH | PraisonAI has an Argument Injection into Cloud Run Environment Variables via Unsanitized C |
| CVE-2026-40149 | 7.9 HIGH | PraisonAI has an Unauthenticated Allow-List Manipulation Bypasses Agent Tool Approval Safe |
| CVE-2026-40150 | 7.7 HIGH | PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool |
| CVE-2026-40116 | 7.5 HIGH | PraisonAI's Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Without |
| CVE-2026-40153 | 7.4 HIGH | PraisonAIAgents Affected by Environment Variable Secret Exfiltration via os.path.expandvar |
| CVE-2026-40114 | 7.2 HIGH | PraisonAI has Server-Side Request Forgery via Unvalidated webhook_url in Jobs API |
| CVE-2026-40148 | 6.5 MEDIUM | PraisonAI Affected by Decompression Bomb DoS via Recipe Bundle Extraction Without Size Lim |
| CVE-2026-40115 | 6.2 MEDIUM | PraisonAI has an Unrestricted Upload Size in WSGI Recipe Registry Server Enables Memory Ex |
| CVE-2026-40117 | 6.2 MEDIUM | PraisonAIAgents Affected by Arbitrary File Read via read_skill_file Missing Workspace Boun |
| CVE-2026-40112 | 5.4 MEDIUM | PraisonAI has Stored XSS via Unsanitized Agent Output in HTML Rendering (nh3 Not a Require |
| CVE-2026-40151 | 5.3 MEDIUM | PraisonAI Affected by Unauthenticated Information Disclosure of Agent Instructions via /ap |
| CVE-2026-40152 | 5.3 MEDIUM | PraisonAIAgents has a Path Traversal via Unvalidated Glob Pattern in list_files Bypasses W |
| CVE-2026-40111 | PraisonAIAgents has an OS Command Injection via shell=True in Memory Hooks Executor (memor |
No comments yet