Impact
The vulnerability resides in the WSGI‑based recipe registry server (server.py) of PraisonAI. The server reads the entire HTTP request body into memory using the client‑supplied Content‑Length header without imposing an upper bound. When authentication is disabled by default, any local process can send arbitrarily large POST requests, causing the server to consume all available memory and crash. This issue is a classic instance of uncontrolled resource consumption, categorized as CWE‑770. The result is a denial of service that can leverage local privileges to disrupt the system's availability.
Affected Systems
All installations of PraisonAI prior to release 4.5.128 are impacted. The vulnerability exists in the server.py module of this product from the vendor MervinPraison.
Risk and Exploitability
The CVSS score of 6.2 indicates a medium severity threat. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitability is high for local attackers due to the default lack of authentication and the straightforward ability to send large request payloads. Remote exploitation would require connectivity to the server and may be mitigated by network segmentation, but the local context presents the most likely attack vector. The primary risk is memory exhaustion leading to service interruption rather than confidentiality or integrity compromise.
OpenCVE Enrichment
Github GHSA