PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl() function in praisonaiagents/tools/web_crawl_tools.py accepts arbitrary URLs from AI agents with zero validation. No scheme allowlisting, hostname/IP blocklisting, or private network checks are applied before fetching. This allows an attacker (or prompt injection in crawled content) to force the agent to fetch cloud metadata endpoints, internal services, or local files via file:// URLs. This vulnerability is fixed in 1.5.128.
References
| Link | Resource |
|---|---|
| https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8f4v-xfm9-3244 | Exploit Vendor Advisory |
| https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8f4v-xfm9-3244 | Exploit Vendor Advisory |
Configurations
History
24 Apr 2026, 14:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:* | |
| References | () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8f4v-xfm9-3244 - Exploit, Vendor Advisory | |
| First Time |
Praison praisonaiagents
Praison |
14 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8f4v-xfm9-3244 - |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-24 14:53
NVD link : CVE-2026-40150
Mitre link : CVE-2026-40150
CVE.ORG link : CVE-2026-40150
JSON object : View
Products Affected
praison
- praisonaiagents
CWE
CWE-918
Server-Side Request Forgery (SSRF)
