Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mervinpraison
Mervinpraison praisonai Mervinpraison praisonaiagents |
|
| Vendors & Products |
Mervinpraison
Mervinpraison praisonai Mervinpraison praisonaiagents |
Tue, 14 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerable to arbitrary code execution through automatic, unsanitized import of a tools.py file from the current working directory. Components including call.py (import_tools_from_file()), tool_resolver.py (_load_local_tools()), and CLI tool-loading paths blindly import ./tools.py at startup without any validation, sandboxing, or user confirmation. An attacker who can place a malicious tools.py in the directory where PraisonAI is launched (such as through a shared project, cloned repository, or writable workspace) achieves immediate arbitrary Python code execution in the host environment. This compromises the full PraisonAI process, the host system, and any connected data or credentials. This issue has been fixed in version 4.5.139. | |
| Title | PraisonAI has RCE via Automatic tools.py Import | |
| Weaknesses | CWE-426 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-14T13:23:29.807Z
Reserved: 2026-04-10T20:22:44.035Z
Link: CVE-2026-40287
Updated: 2026-04-14T13:23:12.078Z
Status : Received
Published: 2026-04-14T04:17:11.977
Modified: 2026-04-14T14:16:14.887
Link: CVE-2026-40287
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:30:56Z