Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-40289 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical Access Control Error in PraisonAI. πŸ“‰ **Consequences**: Unauthenticated remote session hijacking. Attackers can take over active sessions without permission.…

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: Missing authentication on the browser bridge. πŸ›‘οΈ **Flaw**: Source checks are bypassable. πŸ“Œ **CWE**: CWE-306 (Improper Authentication). The security boundary between the browser and the app is broken.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: PraisonAI versions **< 4.5.139**. πŸ“¦ **Components**: `praisonaiagents` versions **< 1.5.140**. 🏒 **Vendor**: Mervin Praison. ⚠️ If you use older versions, you are vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: Full session control. πŸ•΅οΈ **Data**: Access to all data within the hijacked session. 🚫 **No Auth Needed**: Attackers don't need credentials. They just need to trigger the bridge.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. πŸš€ **Exploitation**: Remote (AV:N). 🚫 **Auth**: None required (PR:N). πŸ™… **UI**: No user interaction needed (UI:N). This is an easy target for automated attacks.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp**: No PoC or wild exploits listed in data. πŸ“ **Status**: Advisory published. πŸ•΅οΈ **Risk**: Despite no public code, the CVSS score is High (9.8). Theoretical exploitation is straightforward.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Verify your PraisonAI version. πŸ“Š **Scan**: Look for unauthenticated browser bridge endpoints. πŸ›‘οΈ **Test**: Try accessing the bridge without valid session tokens. If it accepts, you are vulnerable.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ“¦ **Patch**: Upgrade PraisonAI to **v4.5.139+**. πŸ“¦ **Patch**: Upgrade `praisonaiagents` to **v1.5.140+**. πŸ“… **Date**: Advisory released 2026-04-14.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Workaround**: Disable the browser bridge feature if possible. 🚫 **Network**: Restrict access to the application interface. 🧱 **Firewall**: Block external traffic to the bridge ports.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: Patch immediately. πŸ“ˆ **CVSS**: 9.8 (Critical). ⏳ **Time**: Zero-day risk is high. Do not delay updating your infrastructure.