MEDIUMCVE-2026-40151CVSS 5.3

PraisonAI: Unauthenticated Information Disclosure of Agent Instructions via /api/agents in AgentOS

翻译中…

平台

python

组件

praisonai

修复版本

4.5.129

4.5.128

AI Confidence: highNVDEPSS 0.0%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2026-40151 describes an Information Disclosure vulnerability within the praisonai AgentOS deployment platform. This flaw allows unauthenticated attackers to access sensitive information, including agent names, roles, and the initial portion of agent system instructions. The vulnerability impacts versions of praisonai up to 4.5.98, and a fix is available in version 4.5.128.

Python

检测此 CVE 是否影响你的项目

上传你的 requirements.txt 文件,立即知道是否受影响。

上传 requirements.txt支持的格式: requirements.txt · Pipfile.lock

影响与攻击场景翻译中…

The primary impact of CVE-2026-40151 is the exposure of sensitive agent data. An attacker could leverage this information to gain insights into the deployed agents' roles and functionalities, potentially aiding in reconnaissance for further attacks. While the initial system instructions are truncated to 100 characters, this partial exposure can still reveal valuable clues about the agents' intended behavior and configuration. The lack of authentication and the permissive CORS settings (allowing all origins) significantly broaden the attack surface, making exploitation straightforward from any network location. This vulnerability resembles scenarios where internal system details are inadvertently exposed via misconfigured APIs, potentially leading to privilege escalation or data breaches.

利用背景翻译中…

CVE-2026-40151 was published on 2026-04-10. Its severity is currently assessed as Medium. There are no known public exploits or active campaigns targeting this vulnerability at the time of writing. The vulnerability is not listed on KEV or EPSS. Monitor security advisories and threat intelligence feeds for any updates regarding exploitation attempts.

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露
报告1 份威胁报告

EPSS

0.04% (12% 百分位)

CISA SSVC

利用情况poc
可自动化no
技术影响partial

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N5.3MEDIUMAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityLow敏感数据泄露风险IntegrityNone数据未授权篡改风险AvailabilityNone服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
低 — 可访问部分数据。
Integrity
无 — 无完整性影响。
Availability
无 — 无可用性影响。

受影响的软件

组件praisonai
供应商osv
影响范围修复版本
< 4.5.128 – < 4.5.1284.5.129
4.5.128

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. EPSS 更新日期
披露后-1天发布补丁

缓解措施和替代方案翻译中…

The recommended mitigation for CVE-2026-40151 is to immediately upgrade praisonai to version 4.5.128 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. Restrict network access to the AgentOS deployment platform using firewalls or network segmentation to limit exposure. Implement API authentication middleware to require valid credentials for accessing the /api/agents endpoint. Configure CORS to restrict allowed origins to trusted domains only. While not a direct fix, these steps can reduce the attack surface and limit the potential impact of the vulnerability.

修复方法翻译中…

Actualice PraisonAI a la versión 4.5.128 o superior para mitigar la divulgación de información no autenticada. Esta versión corrige la vulnerabilidad al implementar la autenticación adecuada y la validación de API keys, así como al restringir el acceso CORS.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2026-40151 — Information Disclosure in praisonai?

CVE-2026-40151 is an Information Disclosure vulnerability affecting praisonai versions up to 4.5.98. It allows unauthenticated attackers to retrieve agent names, roles, and parts of system instructions via the /api/agents endpoint.

Am I affected by CVE-2026-40151 in praisonai?

You are affected if you are running praisonai version 4.5.98 or earlier. Check your version using /opt/praisonai/bin/praisonai --version.

How do I fix CVE-2026-40151 in praisonai?

Upgrade praisonai to version 4.5.128 or later. As a temporary workaround, restrict network access and implement API authentication.

Is CVE-2026-40151 being actively exploited?

There are currently no known public exploits or active campaigns targeting CVE-2026-40151, but continuous monitoring is recommended.

Where can I find the official praisonai advisory for CVE-2026-40151?

Refer to the praisonai security advisories page for the latest information and official guidance regarding CVE-2026-40151.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。