Description
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenticated session to OpenAI's Realtime API using the server's API key. There are no limits on concurrent connections, message rate, or message size, allowing an unauthenticated attacker to exhaust server resources and drain the victim's OpenAI API credits. This vulnerability is fixed in 4.5.128.
Published: 2026-04-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated use of server resources and OpenAI API credits
Action: Immediate Patch
AI Analysis

Impact

PraisonAI’s /media-stream WebSocket endpoint allows any client to connect without authentication or Twilio signature validation. Each connection instantiates a session with OpenAI’s Realtime API using the server’s API key. Because there are no limits on concurrent connections, message rate or size, an attacker can use this path to exhaust server resources and drain the victim’s OpenAI API credits. The weakness is an uncontrolled resource consumption flaw (CWE‑770).

Affected Systems

The vulnerability affects PraisonAI products from MervinPraison. All versions before 4.5.128 are impacted. The failure is in the media‑stream WebSocket call module, which is a core component of the multi‑agent teams system.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, and the lack of authentication makes exploitation trivial for anyone with network access to the server. Because the endpoint is public, attackers can mount large‑scale requests, potentially causing a denial‑of‑service condition and inflating cloud costs. The EPSS score is not available, and the vulnerability is not listed in the KEV catalog, but the high CVSS and remote unauthenticated nature make it a significant risk.

Generated by OpenCVE AI on April 9, 2026 at 22:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PraisonAI to version 4.5.128 or later, which implements authentication and rate limits on the media-stream endpoint.

Generated by OpenCVE AI on April 9, 2026 at 22:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q5r4-47m9-5mc7 PraisonAI: Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Without Rate Limits
History

Fri, 17 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Praison
Praison praisonai
CPEs cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
Vendors & Products Praison
Praison praisonai

Tue, 14 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Mervinpraison
Mervinpraison praisonai
Vendors & Products Mervinpraison
Mervinpraison praisonai

Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenticated session to OpenAI's Realtime API using the server's API key. There are no limits on concurrent connections, message rate, or message size, allowing an unauthenticated attacker to exhaust server resources and drain the victim's OpenAI API credits. This vulnerability is fixed in 4.5.128.
Title PraisonAI's Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Without Rate Limits
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Mervinpraison Praisonai
Praison Praisonai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-14T14:42:42.722Z

Reserved: 2026-04-09T01:41:38.537Z

Link: CVE-2026-40116

cve-icon Vulnrichment

Updated: 2026-04-14T14:42:21.173Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:35.297

Modified: 2026-04-17T18:33:22.360

Link: CVE-2026-40116

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:54Z

Weaknesses