🔐 CVE Alert

CVE-2026-40159

MEDIUM 5.5

PraisonAI Exposes Sensitive Environment Variable via Untrusted MCP Subprocess Execution

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
3th

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI’s MCP (Model Context Protocol) integration allows spawning background servers via stdio using user-supplied command strings (e.g., MCP("npx -y @smithery/cli ...")). These commands are executed through Python’s subprocess module. By default, the implementation forwards the entire parent process environment to the spawned subprocess. As a result, any MCP command executed in this manner inherits all environment variables from the host process, including sensitive data such as API keys, authentication tokens, and database credentials. This behavior introduces a security risk when untrusted or third-party commands are used. In common scenarios where MCP tools are invoked via package runners such as npx -y, arbitrary code from external or potentially compromised packages may execute with access to these inherited environment variables. This creates a risk of unintended credential exposure and enables potential supply chain attacks through silent exfiltration of secrets. This vulnerability is fixed in 4.5.128.

CWE CWE-200 CWE-214
Vendor mervinpraison
Product praisonai
Published Apr 10, 2026
Last Updated Apr 15, 2026
Stay Ahead of the Next One

Get instant alerts for mervinpraison praisonai

Be the first to know when new medium vulnerabilities affecting mervinpraison praisonai are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

MervinPraison / PraisonAI
< 4.5.128

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-pj2r-f9mw-vrcq