<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-40088 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40088/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 20:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40088/feed.xml" rel="self" type="application/rss+xml"/><item><title>PraisonAI OS Command Injection Vulnerability (CVE-2026-40088)</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-command-injection/</link><pubDate>Thu, 09 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-command-injection/</guid><description>PraisonAI versions prior to 4.5.121 are vulnerable to OS command injection, allowing attackers to execute arbitrary shell commands via user-controlled input in agent workflows, YAML definitions, and LLM-generated tool calls.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, is susceptible to OS command injection in versions prior to 4.5.121. The vulnerability, identified as CVE-2026-40088, stems from the <code>execute_command</code> function and workflow shell execution, which improperly handles user-controlled input. Attackers can inject arbitrary shell commands through shell metacharacters via agent workflows, YAML definitions, and LLM-generated tool calls. This can lead to complete system compromise. It is critical to upgrade to version 4.5.121 or later to remediate this vulnerability. The CVSS v3.1 base score for this vulnerability is 9.6, indicating a critical severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious YAML definition or workflow for PraisonAI.</li>
<li>This crafted input contains shell metacharacters designed to inject arbitrary commands.</li>
<li>The user (victim) imports or executes the attacker-supplied YAML or workflow within PraisonAI.</li>
<li>The <code>execute_command</code> function processes the input without proper sanitization.</li>
<li>The injected shell commands are executed by the underlying operating system.</li>
<li>The attacker gains arbitrary code execution privileges on the PraisonAI server.</li>
<li>The attacker can then perform lateral movement, data exfiltration, or system compromise.</li>
<li>The attacker can further leverage the compromised system to target other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40088 allows an attacker to execute arbitrary commands on the PraisonAI server. This can lead to complete system compromise, data exfiltration, and potential lateral movement within the network. The severity of this vulnerability is rated as critical with a CVSS v3.1 score of 9.6. This could affect any organization using PraisonAI versions prior to 4.5.121.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade PraisonAI to version 4.5.121 or later to patch CVE-2026-40088.</li>
<li>Implement input validation and sanitization for all user-supplied data processed by the <code>execute_command</code> function.</li>
<li>Monitor PraisonAI logs for suspicious command execution patterns after upgrading.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts.</li>
<li>Review and restrict permissions of the PraisonAI service account to minimize the impact of successful command injection.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-40088</category><category>command-injection</category><category>praisonai</category></item></channel></rss>