<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Praisonaiagents — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/praisonaiagents/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 22:08:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/praisonaiagents/feed.xml" rel="self" type="application/rss+xml"/><item><title>PraisonAI SSRF Vulnerability via URL Parsing Discrepancy</title><link>https://feed.craftedsignal.io/briefs/2026-05-praisonai-ssrf/</link><pubDate>Wed, 06 May 2026 22:08:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-praisonai-ssrf/</guid><description>PraisonAI versions 1.6.31 and earlier contain a Server-Side Request Forgery (SSRF) vulnerability due to inconsistent URL parsing between the application's validation logic and the underlying requests library, allowing attackers to bypass intended security checks and access internal resources.</description><content:encoded><![CDATA[<p>PraisonAI, a project utilizing URL validation to prevent SSRF attacks, is vulnerable due to a discrepancy in how URLs are parsed. Specifically, the application&rsquo;s <code>_validate_url</code> function relies on <code>urlparse</code> for security checks, while the actual HTTP requests are made using the <code>requests</code> library. The vulnerability arises from the differing interpretations of URLs containing both an IP address and a username/password component (e.g., <code>http://127.0.0.1:6666\@1.1.1.1</code>). The <code>urlparse</code> function extracts the hostname after the <code>@</code> symbol (1.1.1.1), while <code>requests</code> connects to the host before the <code>@</code> symbol (127.0.0.1).  This allows attackers to bypass the URL validation and send requests to internal resources. This affects PraisonAI agents version 1.6.31 and earlier and could allow access to internal services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a PraisonAI endpoint that accepts a URL as input.</li>
<li>The attacker crafts a malicious URL in the format <code>http://127.0.0.1:6666\@1.1.1.1</code>.</li>
<li>The application&rsquo;s <code>_validate_url</code> function parses the URL using <code>urlparse</code>, which resolves the host to <code>1.1.1.1</code> (a public IP).</li>
<li>The validation logic incorrectly identifies the target as an external resource, and allows the request to proceed.</li>
<li>The application then uses <code>requests.get</code> to make an HTTP request to the provided URL.</li>
<li>The <code>requests</code> library interprets the URL differently and connects to <code>127.0.0.1:6666</code> (a local resource).</li>
<li>The request is sent to the internal service running on <code>127.0.0.1:6666</code>.</li>
<li>The attacker gains access to the internal service, potentially leading to information disclosure or further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows attackers to bypass intended security controls and access internal resources that are not meant to be exposed to the external network. This could lead to the disclosure of sensitive information, the execution of arbitrary code on internal systems, or further lateral movement within the network. The affected package, <code>pip/praisonaiagents</code>, is vulnerable in versions 1.6.31 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PraisonAI SSRF Attempt via URL Parsing Discrepancy</code> to detect attempts to exploit this vulnerability by monitoring for requests with the specific URL format.</li>
<li>Apply the patch or upgrade to a version of PraisonAI agents greater than 1.6.31 to remediate CVE-2026-44335.</li>
<li>Implement additional server-side validation to prevent SSRF as a defense-in-depth measure.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>praisonai</category><category>vulnerability</category></item></channel></rss>