Cyber Posture

CVE-2026-40154

CriticalPublic PoC

Published: 09 April 2026

Published
09 April 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0004 10.8th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-40154 is a critical-severity Inclusion of Functionality from Untrusted Control Sphere (CWE-829) vulnerability in Praison Praisonai. Its CVSS base score is 9.3 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Supply Chain Compromise (T1195); ranked at the 10.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-14 (Signed Components) and SI-7 (Software, Firmware, and Information Integrity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Supply Chain Compromise (T1195) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires verification of component authenticity prior to use or installation, directly addressing the lack of origin validation and integrity checks for remotely fetched templates.

prevent

Mandates integrity verification of software and information such as remote templates before execution, mitigating execution of unverified malicious code.

prevent

Enforces use of digitally signed components and prohibits those from untrusted sources, preventing trust of malicious remote templates as executable code.

MITRE ATT&CK Enterprise TechniquesAI

T1195 Supply Chain Compromise Initial Access
Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Vulnerability enables supply chain attacks via untrusted remote templates (T1195) and arbitrary code execution in PraisonAI (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remotely fetched template files as trusted executable code without integrity verification, origin validation, or user confirmation, enabling supply chain attacks through malicious templates. This vulnerability is fixed in 4.5.128.

Deeper analysisAI

CVE-2026-40154 affects PraisonAI, a multi-agent teams system, in versions prior to 4.5.128. The vulnerability arises because PraisonAI treats remotely fetched template files as trusted executable code without performing integrity verification, origin validation, or user confirmation. This flaw, classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere), enables supply chain attacks through malicious templates and carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N).

An attacker can exploit this vulnerability remotely over the network with low complexity and no required privileges, though it necessitates user interaction, such as a user fetching a malicious template. Successful exploitation allows the attacker to execute arbitrary code in the context of PraisonAI, achieving high impacts on confidentiality and integrity with a changed scope, potentially compromising the system's security and enabling broader supply chain compromise.

The GitHub security advisory (GHSA-pv9q-275h-rh7x) confirms that the vulnerability is fixed in PraisonAI version 4.5.128. Security practitioners should update to this version or later to mitigate the issue, ensuring that template fetching includes proper validation mechanisms.

Details

CWE(s)

Affected Products

praison
praisonai
≤ 4.5.128

CVEs Like This One

CVE-2026-40313Same product: Praison Praisonai
CVE-2026-40156Same product: Praison Praisonai
CVE-2026-44338Same product: Praison Praisonai
CVE-2026-40113Same product: Praison Praisonai
CVE-2026-44334Same product: Praison Praisonai
CVE-2026-40315Same product: Praison Praisonai
CVE-2026-39891Same product: Praison Praisonai
CVE-2026-39888Same product: Praison Praisonai
CVE-2026-34955Same product: Praison Praisonai
CVE-2026-40114Same product: Praison Praisonai

References