CVE-2026-40150

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl() function in praisonaiagents/tools/web_crawl_tools.py accepts arbitrary URLs from AI agents with zero validation. No scheme allowlisting, hostname/IP blocklisting, or private network checks are applied before fetching. This allows an attacker (or prompt injection in crawled content) to force the agent to fetch cloud metadata endpoints, internal services, or local files via file:// URLs. This vulnerability is fixed in 1.5.128.
Configurations

Configuration 1 (hide)

cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*

History

24 Apr 2026, 14:53

Type Values Removed Values Added
CPE cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8f4v-xfm9-3244 - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8f4v-xfm9-3244 - Exploit, Vendor Advisory
First Time Praison praisonaiagents
Praison

14 Apr 2026, 15:16

Type Values Removed Values Added
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8f4v-xfm9-3244 - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8f4v-xfm9-3244 -

09 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 22:16

Updated : 2026-04-24 14:53


NVD link : CVE-2026-40150

Mitre link : CVE-2026-40150

CVE.ORG link : CVE-2026-40150


JSON object : View

Products Affected

praison

  • praisonaiagents
CWE
CWE-918

Server-Side Request Forgery (SSRF)