πŸ” CVE Alert

CVE-2026-40288

CRITICAL 9.8

PraisonAI: Critical RCE via `type: job` workflow YAML

CVSS Score
9.8
EPSS Score
0.1%
EPSS Percentile
20th

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run <file.yaml> loads a YAML file with type: job, the JobWorkflowExecutor in job_workflow.py processes steps that support run: (shell commands via subprocess.run()), script: (inline Python via exec()), and python: (arbitrary Python script execution)β€”all without any validation, sandboxing, or user confirmation. The affected code paths include action_run() in workflow.py and _exec_shell(), _exec_inline_python(), and _exec_python_script() in job_workflow.py. An attacker who can supply or influence a workflow YAML file (particularly in CI pipelines, shared repositories, or multi-tenant deployment environments) can achieve full arbitrary command execution on the host system, compromising the machine and any accessible data or credentials. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents.

CWE CWE-78 CWE-94
Vendor mervinpraison
Product praisonai
Published Apr 14, 2026
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for mervinpraison praisonai

Be the first to know when new critical vulnerabilities affecting mervinpraison praisonai are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

MervinPraison / PraisonAI
< 4.5.139
MervinPraison / praisonaiagents
< 1.5.140

References

NVD β†— CVE.org β†— EPSS Data β†—
github.com: https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-vc46-vw85-3wvm