PraisonAI is a multi-agent teams system. Prior to 4.5.128, the WSGI-based recipe registry server (server.py) reads the entire HTTP request body into memory based on the client-supplied Content-Length header with no upper bound. Combined with authentication being disabled by default (no token configured), any local process can send arbitrarily large POST requests to exhaust server memory and cause a denial of service. The Starlette-based server (serve.py) has RequestSizeLimitMiddleware with a 10MB limit, but the WSGI server lacks any equivalent protection. This vulnerability is fixed in 4.5.128.
References
| Link | Resource |
|---|---|
| https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-2xgv-5cv2-47vv | Exploit Vendor Advisory |
| https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-2xgv-5cv2-47vv | Exploit Vendor Advisory |
Configurations
History
17 Apr 2026, 18:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-2xgv-5cv2-47vv - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:* | |
| First Time |
Praison
Praison praisonai |
13 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-2xgv-5cv2-47vv - |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-17 18:34
NVD link : CVE-2026-40115
Mitre link : CVE-2026-40115
CVE.ORG link : CVE-2026-40115
JSON object : View
Products Affected
praison
- praisonai
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
