CVE-2026-40114

HIGH

PraisonAI has Server-Side Request Forgery via Unvalidated webhook_url in Jobs API

Title source: cna
STIX 2.1

Description

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST request to this URL using httpx.AsyncClient. An unauthenticated attacker can use this to make the server send POST requests to arbitrary internal or external destinations, enabling SSRF against cloud metadata services, internal APIs, and other network-adjacent services. This vulnerability is fixed in 4.5.128.

Scores

CVSS v3 7.2
EPSS 0.0004
EPSS Percentile 12.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-918
Status published
Products (3)
MervinPraison/PraisonAI < 4.5.128
praison/praisonai < 4.5.128
pypi/PraisonAI 0 - 4.5.128PyPI
Published Apr 09, 2026
Tracked Since Apr 10, 2026