5.5

CVSS3.1

CVE-2026-40159 - PraisonAI Exposes Sensitive Environment Variable via Untrusted MCP Subprocess Execution

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI’s MCP (Model Context Protocol) integration allows spawning background servers via stdio using user-supplied command strings (e.g., MCP("npx -y @smithery/cli ...")). These commands are executed through Python’s subprocess module. B…

📅 Published: April 10, 2026, 4:57 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

8.6

CVSS3.1

CVE-2026-40158 - PraisonAI has Improper Control of Generation of Code ('Code Injection') and Protection Mechanism Fa…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct function in praisonaiagents/tools/python_tools.py use…

📅 Published: April 10, 2026, 4:49 p.m. 🔄 Last Modified: April 10, 2026, 6:31 p.m.

9.4

CVSS4.0

CVE-2026-40157 - PraisonAI affected by arbitrary file write via path traversal in `praisonai recipe unpack`

PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the recipe CLI extracts .praison tar archives using raw tar.extract() without validating archive member paths. A .praison bundle containing ../../ entries will write files outside the intended output directory. An attacker who…

📅 Published: April 10, 2026, 4:47 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

7.8

CVSS3.1

CVE-2026-40156 - PraisonAI Affected by Implicit Execution of Arbitrary Code via Automatic `tools.py` Loading

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI automatically loads a file named tools.py from the current working directory to discover and register custom agent tools. This loading process uses importlib.util.spec_from_file_location and immediately executes module-level code …

📅 Published: April 10, 2026, 4:46 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

5.3

CVSS3.1

CVE-2026-40100 - FastGPT has Unauthenticated SSRF in /api/core/app/mcpTools/runTool via missing CHECK_INTERNAL_IP de…

FastGPT is an AI Agent building platform. Prior to 4.14.10.3, the /api/core/app/mcpTools/runTool endpoint accepts arbitrary URLs without authentication. The internal IP check in isInternalAddress() only blocks private IPs when CHECK_INTERNAL_IP=true, which is not the default. This allows unauthenti…

📅 Published: April 10, 2026, 4:39 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

3.7

CVSS3.1

CVE-2026-40097 - Step CA affected by an index out of bounds panic in TPM attestation EKU validation

Step CA is an online certificate authority for secure, automated certificate management for DevOps. From 0.24.0 to before 0.30.0-rc3, an attacker can trigger an index out-of-bounds panic in Step CA by sending a crafted attestation key (AK) certificate with an empty Extended Key Usage (EKU) extensio…

📅 Published: April 10, 2026, 4:34 p.m. 🔄 Last Modified: April 10, 2026, 6:30 p.m.

6.3

CVSS4.0

CVE-2026-40074 - SvelteKit's invalidated redirect in handle hook causes Denial-of-Service

SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Prior to 2.57.1, redirect, when called from inside the handle server hook with a location parameter containing characters that are invalid in a HTTP header, will cause an unhandled TypeError. This coul…

📅 Published: April 10, 2026, 4:26 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

8.2

CVSS4.0

CVE-2026-40073 - SvelteKit has a BODY_SIZE_LIMIT bypass in @sveltejs/adapter-node

SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Prior to 2.57.1, under certain circumstances, requests could bypass the BODY_SIZE_LIMIT on SvelteKit applications running with adapter-node. This bypass does not affect body size limits at other layers…

📅 Published: April 10, 2026, 4:24 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

5.3

CVSS3.1

CVE-2026-40086 - Rembg has a Path Traversal via Custom Model Loading

Rembg is a tool to remove images background. Prior to 2.0.75, a path traversal vulnerability in the rembg HTTP server allows unauthenticated remote attackers to read arbitrary files from the server's filesystem. By sending a crafted request with a malicious model_path parameter, an attacker can for…

📅 Published: April 10, 2026, 4:16 p.m. 🔄 Last Modified: April 10, 2026, 6:29 p.m.

4.3

CVSS3.1

CVE-2026-40103 - Vikunja's Scoped API tokens with projects.background permission can delete project backgrounds

Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, Vikunja's scoped API token enforcement for custom project background routes is method-confused. A token with only projects.background can successfully delete a project background, while a token with only projects.backgr…

📅 Published: April 10, 2026, 4:12 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.
Total resulsts: 343923
Page 10 of 34,393
« previous page » next page
Filters