SQL Identifier Injection Vulnerability in PraisonAI by Mervin Praison
CVE-2026-40315

7.2HIGH

Key Information:

Status
Vendor
CVE Published:
14 April 2026

What is CVE-2026-40315?

PraisonAI, a multi-agent system, suffers from an SQL identifier injection vulnerability in its SQLiteConversationStore component. This flaw arises when the table_prefix configuration value is concatenated directly into SQL queries using f-strings, leaving it unvalidated and unsanitized. Attackers could exploit this vulnerability by influencing the table_prefix value through configuration inputs such as from_yaml or from_dict, allowing them to insert arbitrary SQL commands. This could result in unauthorized access to sensitive data, including internal SQLite tables like sqlite_master, and manipulate the outcomes of queries via methods like UNION-based injection. The vulnerability extends from configuration inputs through different components to SQL query generation, culminating in potential disclosure of the internal schema and tampering with query results. It is essential for users to upgrade to version 4.5.133 or later to mitigate these security concerns.

Affected Version(s)

PraisonAI < 4.5.133

References

CVSS V4

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.