<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-40114 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40114/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 22:16:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40114/feed.xml" rel="self" type="application/rss+xml"/><item><title>PraisonAI SSRF Vulnerability via Unvalidated Webhook URL</title><link>https://feed.craftedsignal.io/briefs/2024-01-praisonai-ssrf/</link><pubDate>Thu, 09 Apr 2026 22:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-praisonai-ssrf/</guid><description>PraisonAI versions prior to 4.5.128 are vulnerable to Server-Side Request Forgery (SSRF) due to a lack of URL validation on the webhook_url parameter in the /api/v1/runs endpoint, allowing unauthenticated attackers to send arbitrary POST requests from the server.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability affecting versions prior to 4.5.128. The vulnerability resides in the <code>/api/v1/runs</code> endpoint, which accepts a <code>webhook_url</code> parameter in the request body without proper validation. This allows an unauthenticated attacker to specify an arbitrary URL, causing the PraisonAI server to send an HTTP POST request to that URL upon job completion. This flaw enables attackers to target internal services, cloud metadata endpoints, and other network-adjacent resources, potentially leading to information disclosure, privilege escalation, or denial-of-service. Organizations using affected versions of PraisonAI should upgrade to version 4.5.128 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a PraisonAI instance running a version prior to 4.5.128.</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>/api/v1/runs</code> endpoint.</li>
<li>The crafted request includes a <code>webhook_url</code> parameter containing a URL pointing to an internal service, cloud metadata endpoint, or external attacker-controlled server.</li>
<li>The PraisonAI server receives the request and queues a job.</li>
<li>The job completes (either successfully or with an error).</li>
<li>Upon completion, the server, using <code>httpx.AsyncClient</code>, initiates an HTTP POST request to the URL specified in the <code>webhook_url</code> parameter.</li>
<li>If the <code>webhook_url</code> points to an internal service, the attacker can potentially access sensitive information or trigger actions within that service.</li>
<li>If the <code>webhook_url</code> points to a cloud metadata endpoint, the attacker can retrieve cloud credentials or configuration details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an unauthenticated attacker to force the PraisonAI server to make arbitrary HTTP POST requests. This can lead to the exposure of sensitive information from internal services or cloud metadata, potentially granting the attacker unauthorized access to systems and data. The vulnerability could also be leveraged to perform denial-of-service attacks against internal resources. While the exact number of affected organizations is unknown, any organization running a vulnerable version of PraisonAI is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI instances to version 4.5.128 or later to remediate CVE-2026-40114.</li>
<li>Inspect web server logs for requests to the <code>/api/v1/runs</code> endpoint containing suspicious <code>webhook_url</code> parameters to detect potential exploitation attempts. Deploy the Sigma rule to detect suspicious webhook URLs.</li>
<li>Monitor network traffic for unexpected outbound connections originating from the PraisonAI server to internal or external destinations, as this could indicate SSRF exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>praisonai</category><category>cve-2026-40114</category><category>web-application</category></item></channel></rss>