← Voltar para CVEs
CVE-2026-40115
MEDIUM6.2
Descricao
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the WSGI-based recipe registry server (server.py) reads the entire HTTP request body into memory based on the client-supplied Content-Length header with no upper bound. Combined with authentication being disabled by default (no token configured), any local process can send arbitrarily large POST requests to exhaust server memory and cause a denial of service. The Starlette-based server (serve.py) has RequestSizeLimitMiddleware with a 10MB limit, but the WSGI server lacks any equivalent protection. This vulnerability is fixed in 4.5.128.
Detalhes CVE
Pontuacao CVSS v3.16.2
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/9/2026
Ultima modificacao4/13/2026
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-770
Referencias
https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-2xgv-5cv2-47vv(security-advisories@github.com)
https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-2xgv-5cv2-47vv(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.