<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-40116 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40116/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 22:16:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40116/feed.xml" rel="self" type="application/rss+xml"/><item><title>PraisonAI Unauthenticated WebSocket Allows Resource Exhaustion</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-websocket-vuln/</link><pubDate>Thu, 09 Apr 2026 22:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-websocket-vuln/</guid><description>PraisonAI before version 4.5.128 is vulnerable to resource exhaustion and API credit draining due to the `/media-stream` WebSocket endpoint accepting unauthenticated connections, allowing attackers to exhaust server resources and drain OpenAI API credits.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, contains a vulnerability in versions prior to 4.5.128 that exposes the <code>/media-stream</code> WebSocket endpoint in its call module. This endpoint lacks authentication or Twilio signature validation, allowing any client to establish a connection. Each successful connection initiates an authenticated session to OpenAI&rsquo;s Realtime API, utilizing the server&rsquo;s API key. Due to the absence of rate limits, connection limits, or message size restrictions, a malicious actor can exploit this vulnerability by creating numerous concurrent connections. This can lead to the exhaustion of server resources and a significant drain on the victim&rsquo;s OpenAI API credits. This vulnerability is addressed and patched in version 4.5.128.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a PraisonAI instance running a vulnerable version (prior to 4.5.128).</li>
<li>Attacker establishes a WebSocket connection to the <code>/media-stream</code> endpoint of the PraisonAI instance without providing any authentication credentials.</li>
<li>The PraisonAI server, upon receiving the unauthenticated WebSocket connection, creates an authenticated session with the OpenAI Realtime API using its own API key.</li>
<li>Attacker sends a large volume of messages through the WebSocket connection, exploiting the lack of message rate limits.</li>
<li>Attacker initiates multiple concurrent WebSocket connections to the <code>/media-stream</code> endpoint.</li>
<li>The PraisonAI server becomes overloaded due to the excessive number of connections and message processing demands.</li>
<li>The victim&rsquo;s OpenAI API credits are rapidly depleted as the PraisonAI server processes requests from the attacker&rsquo;s connections.</li>
<li>The PraisonAI server experiences degraded performance or becomes completely unresponsive, impacting legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in resource exhaustion on the PraisonAI server, potentially causing denial of service for legitimate users. Furthermore, it leads to the unauthorized consumption of the victim&rsquo;s OpenAI API credits, resulting in unexpected charges and potential disruption of services reliant on the OpenAI API. The number of affected organizations depends on the prevalence of vulnerable PraisonAI instances deployed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI installations to version 4.5.128 or later to patch CVE-2026-40116.</li>
<li>Implement rate limiting on WebSocket connections to the <code>/media-stream</code> endpoint to mitigate resource exhaustion.</li>
<li>Monitor OpenAI API usage for unexpected spikes in activity that may indicate exploitation of this vulnerability.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousPraisonAIWebSocketConnections</code> to identify potential exploitation attempts by detecting a high number of connections to the <code>/media-stream</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-40116</category><category>resource-exhaustion</category><category>websocket</category><category>api-abuse</category><category>cloud</category></item></channel></rss>