| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8f4v-xfm9-3244 | PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 14 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mervinpraison
Mervinpraison praisonaiagents |
|
| Vendors & Products |
Mervinpraison
Mervinpraison praisonaiagents |
Thu, 09 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl() function in praisonaiagents/tools/web_crawl_tools.py accepts arbitrary URLs from AI agents with zero validation. No scheme allowlisting, hostname/IP blocklisting, or private network checks are applied before fetching. This allows an attacker (or prompt injection in crawled content) to force the agent to fetch cloud metadata endpoints, internal services, or local files via file:// URLs. This vulnerability is fixed in 1.5.128. | |
| Title | PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-14T14:40:19.512Z
Reserved: 2026-04-09T19:31:56.013Z
Link: CVE-2026-40150
Updated: 2026-04-14T14:40:11.542Z
Status : Undergoing Analysis
Published: 2026-04-09T22:16:35.900
Modified: 2026-04-14T15:16:37.700
Link: CVE-2026-40150
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:28:48Z
Github GHSA