PraisonAI Template Injection Vulnerability (CVE-2026-40154)
PraisonAI before version 4.5.128 is vulnerable to supply chain attacks due to treating remotely fetched template files as trusted executable code without proper verification, enabling exploitation via malicious templates.
PraisonAI, a multi-agent teams system, is susceptible to a critical vulnerability (CVE-2026-40154) affecting versions prior to 4.5.128. The application’s design flaw involves treating remotely fetched template files as trusted executable code. This occurs without performing necessary security checks such as integrity verification, origin validation, or user confirmation. This lack of validation opens a significant attack vector, allowing for supply chain compromises. Attackers can inject malicious code into template files, leading to arbitrary code execution within the PraisonAI environment. The vulnerability was reported on April 9, 2026, and patched in version 4.5.128. Defenders should prioritize upgrading to the latest version to mitigate the risk of exploitation via crafted template files.
Attack Chain
- Attacker identifies a PraisonAI instance running a version prior to 4.5.128.
- Attacker crafts a malicious template file containing arbitrary code. This could involve injecting shell commands or scripts designed to compromise the system.
- The attacker hosts the malicious template file on a remote server under their control.
- The attacker manipulates PraisonAI to fetch the malicious template file. This could involve exploiting a configuration setting or tricking a user into initiating the download.
- PraisonAI fetches the template file from the attacker’s server without proper validation.
- The application treats the template file as trusted executable code.
- The malicious code within the template is executed by PraisonAI, leading to arbitrary code execution.
- The attacker gains unauthorized access to the PraisonAI system and can perform actions such as data exfiltration, lateral movement, or denial of service.
Impact
Successful exploitation of CVE-2026-40154 can result in a complete compromise of the PraisonAI system. This can lead to unauthorized access to sensitive data, disruption of services, and potential lateral movement within the network. The vulnerable software enables supply chain attacks, making it a critical issue for organizations relying on PraisonAI for their operations. The impact is amplified by the lack of user interaction required for the attack to succeed, with a CVSS v3.1 score of 9.3 highlighting the severity.
Recommendation
- Immediately upgrade PraisonAI installations to version 4.5.128 or later to patch CVE-2026-40154.
- Implement network monitoring to detect attempts to fetch template files from untrusted sources, using the network_connection log source and the IOCs if available.
- Deploy the Sigma rule “Detect PraisonAI Template File Download” to identify suspicious network connections related to template file retrieval.
- Implement integrity monitoring on template files if available to detect unauthorized modifications.
Detection coverage 2
Detect PraisonAI Template File Download
mediumDetects network connections to download template files by PraisonAI, which may indicate an exploitation attempt of CVE-2026-40154.
Detect PraisonAI Template File Download Linux
mediumDetects network connections to download template files by PraisonAI on linux systems.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
2
| Type | Value |
|---|---|
| [email protected] | |
| [email protected] |