CVE-2026-41496
Description
PraisonAI is a multi-agent teams system. Prior to praisonai version 4.6.9 and praisonaiagents version 1.6.9, the fix for CVE-2026-40315 added input validation to SQLiteConversationStore only. Nine sibling backends — MySQL, PostgreSQL, async SQLite/MySQL/PostgreSQL, Turso, SingleStore, Supabase, SurrealDB — pass table_prefix straight into f-string SQL. Same root cause, same code pattern, same exploitation. 52 unvalidated injection points across the codebase. postgres.py additionally accepts an unvalidated schema parameter used directly in DDL. This issue has been patched in praisonai version 4.6.9 and praisonaiagents version 1.6.9.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
praisonaiPyPI | < 4.5.149 | 4.5.149 |
praisonaiagentsPyPI | < 1.6.8 | 1.6.8 |
Affected products
3Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/MervinPraison/PraisonAI/security/advisories/GHSA-rg3h-x3jw-7jm5nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-rg3h-x3jw-7jm5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41496ghsaADVISORY
News mentions
0No linked articles in our index yet.