Environment Variable Injection Vulnerability in PraisonAI by MervinPraison
CVE-2026-40113

8.4HIGH

Key Information:

Status
Vendor
CVE Published:
9 April 2026

What is CVE-2026-40113?

The vulnerability in PraisonAI, prior to version 4.5.128, arises from the deploy.py script, which improperly constructs a single comma-delimited string for the gcloud run deploy --set-env-vars argument. This is done by directly interpolating the values of openai_model, openai_key, and openai_base without validating that these inputs do not contain commas. Since the gcloud command uses commas to separate key-value pairs, the presence of a comma in any of these variable values can lead to the unintentional parsing of trailing text as additional KEY=VALUE pairs. This flaw enables an attacker to inject arbitrary environment variables into the deployed Cloud Run service, potentially leading to unauthorized access or manipulation of the application.

Affected Version(s)

PraisonAI < 4.5.128

References

CVSS V3.1

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.