Impact
PraisonAI, a multi‑agent system, allows an unauthenticated caller to request the /api/agents endpoint. The response includes agent names, roles, and the first 100 characters of each agent’s system instructions, leaking potentially sensitive operational data. This confidentiality breach is identified as CWE‑200.
Affected Systems
The vulnerability exists in MervinPraison PraisonAI versions earlier than 4.5.128. Deployments using the AgentOS FastAPI application with no authentication middleware, no API key validation, and the default CORS allow_origins="*" with host="0.0.0.0" are affected because every deployment is network‑accessible and queryable from any origin by default.
Risk and Exploitability
The CVSS score of 5.3 indicates medium severity, and there is no EPSS data or KEV listing. The attack requires only unauthenticated network access to the AgentOS host. The impact is a compromise of confidentiality, exposing agent instructions to anyone who can reach the exposed endpoint.
OpenCVE Enrichment
Github GHSA