PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the execute_command function in shell_tools.py calls os.path.expandvars() on every command argument at line 64, manually re-implementing shell-level environment variable expansion despite using shell=False (line 88) for security. This allows exfiltration of secrets stored in environment variables (database credentials, API keys, cloud access keys). The approval system displays the unexpanded $VAR references to human reviewers, creating a deceptive approval where the displayed command differs from what actually executes. This vulnerability is fixed in 1.5.128.
References
| Link | Resource |
|---|---|
| https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-v8g7-9q6v-p3x8 | Exploit Vendor Advisory |
| https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-v8g7-9q6v-p3x8 | Exploit Vendor Advisory |
Configurations
History
20 Apr 2026, 19:55
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:* | |
| References | () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-v8g7-9q6v-p3x8 - Exploit, Vendor Advisory | |
| First Time |
Praison praisonaiagents
Praison |
13 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-v8g7-9q6v-p3x8 - |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-20 19:55
NVD link : CVE-2026-40153
Mitre link : CVE-2026-40153
CVE.ORG link : CVE-2026-40153
JSON object : View
Products Affected
praison
- praisonaiagents
CWE
CWE-526
Cleartext Storage of Sensitive Information in an Environment Variable
