CVE-2026-40154
Remote Code Execution via Untrusted Template in PraisonAI
Publication date: 2026-04-09
Last updated on: 2026-04-15
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| praison | praisonai | to 4.5.128 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-829 | The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in PraisonAI occurs because the system treats remotely fetched template files as trusted executable code without verifying their integrity, validating their origin, or requiring user confirmation. This means that malicious templates can be introduced through the supply chain, potentially allowing attackers to execute harmful code within the system.
How can this vulnerability impact me? :
This vulnerability can lead to supply chain attacks where malicious code is executed within PraisonAI by exploiting the trust placed in remotely fetched templates. The impact includes high confidentiality and integrity risks, as attackers could execute unauthorized code, potentially compromising sensitive data and system operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade PraisonAI to version 4.5.128 or later, where the issue is fixed.