Command Execution Vulnerability in PraisonAI by Mervin Praison
CVE-2026-40159

5.5MEDIUM

Key Information:

Status
Vendor
CVE Published:
10 April 2026

What is CVE-2026-40159?

Prior to version 4.5.128, PraisonAI's Model Context Protocol (MCP) integration allowed the execution of user-supplied command strings, which could lead to the execution of arbitrary code with access to sensitive environment variables. This includes API keys, authentication tokens, and database credentials inherited from the host process. As a result, malicious actors could leverage untrusted commands to exfiltrate sensitive data or execute harmful actions within the system. Notably, when package runners like npx -y are used, there is a high risk of executing compromised code, highlighting the need for security measures against potential supply chain threats.

Affected Version(s)

PraisonAI < 4.5.128

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.