๐Ÿ” CVE Alert

CVE-2026-40112

MEDIUM 5.4

PraisonAI has Stored XSS via Unsanitized Agent Output in HTML Rendering (nh3 Not a Required Dependency)

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
8th

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoint in src/praisonai/api.py renders agent output as HTML without effective sanitization. The _sanitize_html function relies on the nh3 library, which is not listed as a required or optional dependency in pyproject.toml. When nh3 is absent (the default installation), the sanitizer is a no-op that returns HTML unchanged. An attacker who can influence agent input (via RAG data poisoning, web scraping results, or prompt injection) can inject arbitrary JavaScript that executes in the browser of anyone viewing the API output. This vulnerability is fixed in 4.5.128.

CWE CWE-79
Vendor mervinpraison
Product praisonai
Published Apr 9, 2026
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for mervinpraison praisonai

Be the first to know when new medium vulnerabilities affecting mervinpraison praisonai are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

MervinPraison / PraisonAI
< 4.5.128

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-cfg2-mxfj-j6pw