CVE-2026-40114
🟡 Monitoruj
Brak walidacji URL w PraisonAI pozwala na atak SSRF na wewnętrzne usługi.
CVSS
7.2
EPSS
0.0%
Exploit
poc
Vendor
praison
Opis źródłowy (NVD)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST request to this URL using httpx.AsyncClient. An unauthenticated attacker can use this to make the server send POST requests to arbitrary internal or external destinations, enabling SSRF against cloud metadata services, internal APIs, and other network-adjacent services. This vulnerability is fixed in 4.5.128.
exploit ssrf
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.2 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-09 22:16:35 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-17 18:36:03 UTC |
Referencje
- https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8frj-8q3m-xhgm (security-advisories@github.com) [Exploit, Vendor Advisory]