Cyber Posture

CVE-2026-40111

HighPublic PoCRCE

Published: 09 April 2026

Published
09 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-40111 is a high-severity OS Command Injection (CWE-78) vulnerability in Praison Praisonaiagents. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 8.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Other AI Platforms; in the LLM/Generative AI Risks risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates OS command injection by requiring validation of user-controlled command strings passed to subprocess.run() with shell=True, preventing shell metacharacter interpretation.

prevent

Remediates the specific flaw in the memory hooks executor by applying the vendor fix in version 1.5.128 that addresses unsanitized inputs.

detect

Detects unauthorized modifications to .praisonai/hooks.json via integrity verification, addressing the persistent attack surface from file overwrites through prompt injection.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

OS command injection via unsanitized user input to subprocess.run(shell=True) with /bin/sh directly enables remote code execution on a network-accessible application (T1190) using Unix shell commands (T1059.004). The hooks.json lifecycle mechanism further facilitates persistent execution on agent events.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he memory hooks executor in praisonaiagents passes a user-controlled command string directly to subprocess.run() with shell=True at src/praisonai-agents/praisonaiagents/memory/hooks.py. No sanitization is performed and shell metacharacters are interpreted by /bin/sh before the…

more

intended command executes. Two independent attack surfaces exist. The first is via pre_run_command and post_run_command hook event types registered through the hooks configuration. The second and more severe surface is the .praisonai/hooks.json lifecycle configuration, where hooks registered for events such as BEFORE_TOOL and AFTER_TOOL fire automatically during agent operation. An agent that gains file-write access through prompt injection can overwrite .praisonai/hooks.json and have its payload execute silently at every subsequent lifecycle event without further user interaction. This vulnerability is fixed in 1.5.128.

Deeper analysisAI

CVE-2026-40111 is an OS command injection vulnerability (CWE-78) in PraisonAIAgents, a multi-agent teams system within the PraisonAI project. Prior to version 1.5.128, the memory hooks executor in the praisonaiagents component, located at src/praisonai-agents/praisonaiagents/memory/hooks.py, passes a user-controlled command string directly to subprocess.run() with shell=True. No sanitization occurs, allowing shell metacharacters to be interpreted by /bin/sh before the intended command executes.

The vulnerability exposes two attack surfaces. The first involves pre_run_command and post_run_command hook event types registered through the hooks configuration. The second, more severe surface is the .praisonai/hooks.json lifecycle configuration, where hooks for events like BEFORE_TOOL and AFTER_TOOL execute automatically during agent operation. Remote attackers (AV:N, AC:L, PR:N) can exploit this with user interaction (UI:R), achieving high confidentiality, integrity, and availability impacts (CVSS 8.8). An agent with file-write access via prompt injection can overwrite .praisonai/hooks.json, enabling silent payload execution on every subsequent lifecycle event without further interaction.

The GitHub security advisory (GHSA-v7px-3835-7gjx) confirms the issue is fixed in PraisonAIAgents version 1.5.128. Security practitioners should upgrade to this version or later and review hook configurations for user-controlled inputs.

This vulnerability has particular relevance to AI/ML deployments, as it affects a multi-agent system exploitable through prompt injection for persistent command execution during agent lifecycles. No public evidence of real-world exploitation is available as of the CVE publication on 2026-04-09.

Details

CWE(s)

Affected Products

praison
praisonaiagents
≤ 1.5.128

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
LLM/Generative AI Risks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: prompt injection

CVEs Like This One

CVE-2026-34937Same product: Praison Praisonaiagents
CVE-2026-40117Same product: Praison Praisonaiagents
CVE-2026-40150Same product: Praison Praisonaiagents
CVE-2026-34938Same product: Praison Praisonaiagents
CVE-2026-34954Same product: Praison Praisonaiagents
CVE-2026-40288Same product: Praison Praisonaiagents
CVE-2026-44335Same product: Praison Praisonaiagents
CVE-2026-40088Same vendor: Praison
CVE-2026-40153Same product: Praison Praisonaiagents
CVE-2026-34955Same vendor: Praison

References