High severity7.9NVD Advisory· Published Apr 9, 2026· Updated Apr 20, 2026
CVE-2026-40149
CVE-2026-40149
Description
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/approval/allow-list endpoint permits unauthenticated modification of the tool approval allowlist when no auth_token is configured (the default). By adding dangerous tool names (e.g., shell_exec, file_write) to the allowlist, an attacker can cause the ExecApprovalManager to auto-approve all future agent invocations of those tools, bypassing the human-in-the-loop safety mechanism that the approval system is specifically designed to enforce. This vulnerability is fixed in 4.5.128.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
PraisonAIPyPI | < 4.5.128 | 4.5.128 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/MervinPraison/PraisonAI/security/advisories/GHSA-4wr3-f4p3-5wjhnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-4wr3-f4p3-5wjhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40149ghsaADVISORY
- github.com/MervinPraison/PraisonAI/releases/tag/v4.5.128ghsaWEB
News mentions
0No linked articles in our index yet.