CVE-2026-40114
HIGHPraisonAI has Server-Side Request Forgery via Unvalidated webhook_url in Jobs API
Title source: cnaDescription
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST request to this URL using httpx.AsyncClient. An unauthenticated attacker can use this to make the server send POST requests to arbitrary internal or external destinations, enabling SSRF against cloud metadata services, internal APIs, and other network-adjacent services. This vulnerability is fixed in 4.5.128.
Scores
CVSS v3
7.2
EPSS
0.0004
EPSS Percentile
12.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (3)
MervinPraison/PraisonAI
< 4.5.128
praison/praisonai
< 4.5.128
pypi/PraisonAI
0 - 4.5.128PyPI
Published
Apr 09, 2026
Tracked Since
Apr 10, 2026