CVE-2026-40112
Description
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoint in src/praisonai/api.py renders agent output as HTML without effective sanitization. The _sanitize_html function relies on the nh3 library, which is not listed as a required or optional dependency in pyproject.toml. When nh3 is absent (the default installation), the sanitizer is a no-op that returns HTML unchanged. An attacker who can influence agent input (via RAG data poisoning, web scraping results, or prompt injection) can inject arbitrary JavaScript that executes in the browser of anyone viewing the API output. This vulnerability is fixed in 4.5.128.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
PraisonAIPyPI | < 4.5.128 | 4.5.128 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/MervinPraison/PraisonAI/security/advisories/GHSA-cfg2-mxfj-j6pwnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-cfg2-mxfj-j6pwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40112ghsaADVISORY
- github.com/MervinPraison/PraisonAI/releases/tag/v4.5.128ghsaWEB
News mentions
0No linked articles in our index yet.