Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. praisonaiagents
  4. ›
  5. CVE-2026-40289

CVE-2026-40289: PraisonAI Browser Server allows unauthenticated WebSocket clients to hijack connected extension sessions

April 10, 2026 (updated April 14, 2026)

praisonai browser start exposes the browser bridge on 0.0.0.0 by default, and its /ws endpoint accepts websocket clients that omit the Origin header entirely. An unauthenticated network client can connect as a fake controller, send start_session, cause the server to forward start_automation to another connected browser-extension websocket, and receive the resulting action/status stream back over that hijacked session. This allows unauthorized remote use of a connected browser automation session without any credentials.

References

  • github.com/MervinPraison/PraisonAI
  • github.com/MervinPraison/PraisonAI/releases/tag/v4.5.139
  • github.com/MervinPraison/PraisonAI/security/advisories/GHSA-8x8f-54wf-vv92
  • github.com/advisories/GHSA-8x8f-54wf-vv92
  • nvd.nist.gov/vuln/detail/CVE-2026-40289

Code Behaviors & Features

Detect and mitigate CVE-2026-40289 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.5.140

Fixed versions

  • 1.5.140

Solution

Upgrade to version 1.5.140 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-306: Missing Authentication for Critical Function

Source file

pypi/praisonaiagents/CVE-2026-40289.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:49 +0000.