Command Execution Vulnerability in PraisonAI by Mervin Praison
CVE-2026-40159
5.5MEDIUM
What is CVE-2026-40159?
Prior to version 4.5.128, PraisonAI's Model Context Protocol (MCP) integration allowed the execution of user-supplied command strings, which could lead to the execution of arbitrary code with access to sensitive environment variables. This includes API keys, authentication tokens, and database credentials inherited from the host process. As a result, malicious actors could leverage untrusted commands to exfiltrate sensitive data or execute harmful actions within the system. Notably, when package runners like npx -y are used, there is a high risk of executing compromised code, highlighting the need for security measures against potential supply chain threats.
Affected Version(s)
PraisonAI < 4.5.128
