Arbitrary Code Execution Vulnerability in PraisonAI by Mervin Praison
CVE-2026-40156

7.8HIGH

Key Information:

Status
Vendor
CVE Published:
10 April 2026

What is CVE-2026-40156?

PraisonAI, a multi-agent teams system, contains a vulnerability that allows arbitrary code execution by loading a default file named tools.py from the working directory without user consent or validation. This automatic loading process occurs via importlib.util and executes code found in the tools.py file, which can be exploited by an attacker simply by placing a malicious file in the directory where PraisonAI is executed. This behavior undermines the expected security parameters, allowing untrusted content to be treated as executable code. The vulnerability is addressed in version 4.5.128.

Affected Version(s)

PraisonAI < 4.5.128

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.