6.2

CVSS3.1

CVE-2026-40117 - PraisonAIAgents Affected by Arbitrary File Read via read_skill_file Missing Workspace Boundary and …

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, read_skill_file() in skill_tools.py allows reading arbitrary files from the filesystem by accepting an unrestricted skill_path parameter. Unlike file_tools.read_file which enforces workspace boundary confinement, and unlike run_skill_…

📅 Published: April 9, 2026, 9:21 p.m. 🔄 Last Modified: April 10, 2026, 6:14 p.m.

7.5

CVSS3.1

CVE-2026-40116 - PraisonAI's Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Without Rate Lim…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenticated session to OpenAI's Realtime API using the ser…

📅 Published: April 9, 2026, 9:20 p.m. 🔄 Last Modified: April 10, 2026, 9:28 a.m.

6.2

CVSS3.1

CVE-2026-40115 - PraisonAI has an Unrestricted Upload Size in WSGI Recipe Registry Server Enables Memory Exhaustion …

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the WSGI-based recipe registry server (server.py) reads the entire HTTP request body into memory based on the client-supplied Content-Length header with no upper bound. Combined with authentication being disabled by default (no token config…

📅 Published: April 9, 2026, 9:19 p.m. 🔄 Last Modified: April 10, 2026, 9:28 a.m.

7.2

CVSS3.1

CVE-2026-40114 - PraisonAI has Server-Side Request Forgery via Unvalidated webhook_url in Jobs API

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST request to this URL using httpx.AsyncClient. An unauth…

📅 Published: April 9, 2026, 9:18 p.m. 🔄 Last Modified: April 10, 2026, 9:28 a.m.

8.4

CVSS3.1

CVE-2026-40113 - PraisonAI has an Argument Injection into Cloud Run Environment Variables via Unsanitized Comma in g…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, deploy.py constructs a single comma-delimited string for the gcloud run deploy --set-env-vars argument by directly interpolating openai_model, openai_key, and openai_base without validating that these values do not contain commas. gcloud us…

📅 Published: April 9, 2026, 9:17 p.m. 🔄 Last Modified: April 10, 2026, 6:13 p.m.

5.4

CVSS3.1

CVE-2026-40112 - PraisonAI has Stored XSS via Unsanitized Agent Output in HTML Rendering (nh3 Not a Required Depende…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoint in src/praisonai/api.py renders agent output as HTML without effective sanitization. The _sanitize_html function relies on the nh3 library, which is not listed as a required or optional dependency in pyproject.toml. W…

📅 Published: April 9, 2026, 9:16 p.m. 🔄 Last Modified: April 10, 2026, 9:28 a.m.

7

CVSS4.0

CVE-2026-5263 - URI nameConstraints not enforced in ConfirmNameConstraints()

URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with URI SAN entries that violate the nameConstraints of the issuing CA, and wolfSSL would …

📅 Published: April 9, 2026, 9:15 p.m. 🔄 Last Modified: April 10, 2026, 6:09 p.m.

8.7

CVSS4.0

CVE-2026-5981 - D-Link DIR-605L POST Request formAdvFirewall buffer overflow

A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewall of the file /goform/formAdvFirewall of the component POST Request Handler. Such manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has be…

📅 Published: April 9, 2026, 9:15 p.m. 🔄 Last Modified: April 9, 2026, 9:15 p.m.

9.3

CVSS4.0

CVE-2026-40111 - PraisonAIAgents has an OS Command Injection via shell=True in Memory Hooks Executor (memory/hooks.p…

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he memory hooks executor in praisonaiagents passes a user-controlled command string directly to subprocess.run() with shell=True at src/praisonai-agents/praisonaiagents/memory/hooks.py. No sanitization is performed and shell metachara…

📅 Published: April 9, 2026, 9:14 p.m. 🔄 Last Modified: April 10, 2026, 9:29 a.m.

3.1

CVSS3.1

CVE-2026-40109 - Flux notification-controller GCR Receiver missing email validation allows unauthorized reconciliati…

Flux notification-controller is the event forwarder and notification dispatcher for the GitOps Toolkit controllers. Prior to 1.8.3, the gcr Receiver type in Flux notification-controller does not validate the email claim of Google OIDC tokens used for Pub/Sub push authentication. This allows any val…

📅 Published: April 9, 2026, 9:06 p.m. 🔄 Last Modified: April 10, 2026, 9:29 a.m.
Total resulsts: 343923
Page 34 of 34,393
« previous page » next page
Filters