Critical (9.3)

CVE-2026-40154: PraisonAI Remote Code Execution

CVE-2026-40154

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remotely fetched template files as trusted executable code without integrity verification, origin validation, or user confir...

Overview

A critical vulnerability in PraisonAI, identified as CVE-2026-40154, allows for remote code execution. The flaw exists in versions prior to 4.5.128. The PraisonAI system, a framework for creating multi-agent AI teams, fails to properly validate externally fetched template files before executing them as code.

Vulnerability Details

This vulnerability stems from a lack of security controls in the template-fetching mechanism. When PraisonAI retrieves a template file from a remote source-such as a URL specified in an agent configuration-it treats the content as trusted and executable without performing integrity checks, verifying the origin, or seeking user confirmation. This design flaw enables a classic supply chain attack.

An attacker can compromise a template repository or serve a malicious template from a controlled server. When a PraisonAI instance fetches and executes this template, the attacker’s code runs within the application’s context. The attack complexity is low, requiring no privileges, though it does require user interaction to trigger the template fetch process.

Impact

Successful exploitation leads to full remote code execution on the system running the vulnerable PraisonAI instance. This could allow an attacker to:

  • Steal sensitive data, API keys, or model credentials processed by the AI agents.
  • Install persistent malware or ransomware on the host.
  • Use the compromised system as a foothold for lateral movement within a network.
  • Corrupt AI agent logic and outputs.

Given the CVSS score of 9.3 and the potential for severe compromise, this vulnerability must be treated as a critical risk.

Remediation and Mitigation

The primary and only complete remediation is to upgrade PraisonAI to version 4.5.128 or later, where this vulnerability has been patched.

Immediate Actions:

  1. Patch: Identify all instances of PraisonAI and upgrade them to version 4.5.128 immediately.
  2. Audit Templates: Review the sources of all template files in use. Ensure they are from trusted, reputable repositories.
  3. Network Controls: As a temporary mitigation if patching is delayed, implement network egress rules to restrict outbound connections from PraisonAI instances to only explicitly allowed, trusted template sources.

Organizations using older, unpatched versions should assume they are vulnerable to attack.

Security Insight

CVE-2026-40154 is a stark reminder that the rush to adopt powerful AI orchestration tools often outpaces the implementation of basic software supply chain security. Similar to past incidents in CI/CD pipelines and package managers, trusting external code without verification creates a single point of failure. This vulnerability mirrors the growing risks highlighted by the adoption of tools like CyberStrikeAI, where advanced functionality is leveraged for exploitation. It underscores that foundational security practices-like integrity verification-are non-negotiable, even in cutting-edge AI ecosystems.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.