Description
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST request to this URL using httpx.AsyncClient. An unauthenticated attacker can use this to make the server send POST requests to arbitrary internal or external destinations, enabling SSRF against cloud metadata services, internal APIs, and other network-adjacent services. This vulnerability is fixed in 4.5.128.
Published: 2026-04-09
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch Immediately
AI Analysis

Impact

An unvalidated webhook_url field in PraisonAI’s job‑submission API allows an attacker to specify any HTTP or HTTPS target. When a job finishes, the server automatically performs a POST request to that URL using httpx.AsyncClient. The flaw permits the server to reach arbitrary internal or external services, enabling the attacker to access cloud metadata, internal APIs, or other networks. This is a classic server‑side request forgery weakness.

Affected Systems

All installations of MervinPraison’s PraisonAI released before version 4.5.128 are impacted. The vulnerability exists in the /api/v1/runs endpoint where a webhook_url can be supplied without validation.

Risk and Exploitability

The issue is assigned a high severity rating, and because the endpoint does not require authentication, any remote user can trigger the flaw with a simple crafted request. The ability to direct the server to any destination gives attackers a powerful vector to exfiltrate data or compromise internal services. Overall, the risk from this vulnerability is substantial.

Generated by OpenCVE AI on April 9, 2026 at 23:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PraisonAI to version 4.5.128 or newer

Generated by OpenCVE AI on April 9, 2026 at 23:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8frj-8q3m-xhgm PraisonAI Vulnerable to Server-Side Request Forgery via Unvalidated webhook_url in Jobs API
History

Fri, 17 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Praison
Praison praisonai
CPEs cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
Vendors & Products Praison
Praison praisonai

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Mervinpraison
Mervinpraison praisonai
Vendors & Products Mervinpraison
Mervinpraison praisonai

Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST request to this URL using httpx.AsyncClient. An unauthenticated attacker can use this to make the server send POST requests to arbitrary internal or external destinations, enabling SSRF against cloud metadata services, internal APIs, and other network-adjacent services. This vulnerability is fixed in 4.5.128.
Title PraisonAI has Server-Side Request Forgery via Unvalidated webhook_url in Jobs API
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Mervinpraison Praisonai
Praison Praisonai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-13T20:38:45.906Z

Reserved: 2026-04-09T01:41:38.537Z

Link: CVE-2026-40114

cve-icon Vulnrichment

Updated: 2026-04-13T20:38:41.562Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:35.000

Modified: 2026-04-17T18:36:03.437

Link: CVE-2026-40114

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:57Z

Weaknesses