Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. praisonai
  4. ›
  5. CVE-2026-39889

CVE-2026-39889: PraisonAI Has Unauthenticated SSE Event Stream that Exposes All Agent Activity in A2U Server

April 8, 2026 (updated April 9, 2026)

The A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentication. This is a separate component from the gateway server fixed in CVE-2026-34952.

The create_a2u_routes() function registers the following endpoints with NO authentication checks:

  • GET /a2u/info — exposes server info and stream names
  • POST /a2u/subscribe — creates event stream subscription
  • GET /a2u/events/{stream_name} — streams ALL agent events
  • GET /a2u/events/sub/{id} — streams events for subscription
  • GET /a2u/health — health check

An unauthenticated attacker can:

  1. POST /a2u/subscribe → receive subscription_id
  2. GET /a2u/events/sub/{subscription_id} → receive live SSE stream of all agent events including responses, tool calls, and thinking

This exposes sensitive agent activity including responses, internal reasoning, and tool call arguments to any network attacker.

[1] POST /a2u/subscribe (no auth token) Status: 200 Response: {“subscription_id”:“sub-a1ad8a6edd8b”,“stream_name”:“events”, “stream_url”:“http://testserver/a2u/events/sub-a1ad8a6edd8b”} Got subscription_id: sub-a1ad8a6edd8b

[2] GET /a2u/info (no auth token) Status: 200 Response: {“name”:“A2U Event Stream”,“version”:“1.0.0”, “streams”:[“events”],“event_types”:[“agent.started”,“agent.thinking”, “agent.tool_call”,“agent.response”,“agent.completed”,“agent.error”]}

[3] GET /a2u/health (no auth token) Status: 200 Response: {“status”:“healthy”,“active_subscriptions”:1,“active_streams”:1}

Impact: Attacker can subscribe and receive ALL agent events including responses, tool calls, and internal reasoning in real-time

References

  • github.com/MervinPraison/PraisonAI
  • github.com/MervinPraison/PraisonAI/releases/tag/v4.5.115
  • github.com/MervinPraison/PraisonAI/security/advisories/GHSA-f292-66h9-fpmf
  • github.com/advisories/GHSA-f292-66h9-fpmf
  • nvd.nist.gov/vuln/detail/CVE-2026-39889

Code Behaviors & Features

Detect and mitigate CVE-2026-39889 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.5.115

Fixed versions

  • 4.5.115

Solution

Upgrade to version 4.5.115 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

pypi/praisonai/CVE-2026-39889.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:09 +0000.