CVE-2026-40150 PUBLISHED

PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool

Assigner: GitHub_M
Reserved: 09.04.2026 Published: 09.04.2026 Updated: 09.04.2026

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl() function in praisonaiagents/tools/web_crawl_tools.py accepts arbitrary URLs from AI agents with zero validation. No scheme allowlisting, hostname/IP blocklisting, or private network checks are applied before fetching. This allows an attacker (or prompt injection in crawled content) to force the agent to fetch cloud metadata endpoints, internal services, or local files via file:// URLs. This vulnerability is fixed in 1.5.128.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS Score: 7.7

Product Status

Vendor MervinPraison
Product PraisonAIAgents
Versions
  • Version < 1.5.128 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE