Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
2.1 LOW
CVE-2026-5772 — MatchDomainName 1-Byte Stack Buffer Over-Read in Hostname Validation

A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * e…

wolfssl | Remote | Memory Corruption
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
8.3 HIGH
CVE-2026-5264 — DTLS 1.3 ACK heap buffer overflow

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

wolfssl | Remote | Memory Corruption
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
7.0 HIGH
CVE-2026-5263 — URI nameConstraints not enforced in ConfirmNameConstraints()

URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf cert…

wolfssl | Remote | Misconfiguration
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
9.3 CRITICAL
CVE-2026-40154 — PraisonAI Affected by Untrusted Remote Template Code Execution

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remotely fetched template files as trusted executable code without integrity verification, origin validation, or user confi…

praisonai | Remote | Supply Chain
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
7.4 HIGH
CVE-2026-40153 — PraisonAIAgents Affected by Environment Variable Secret Exfiltration via os.path.expandva…

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the execute_command function in shell_tools.py calls os.path.expandvars() on every command argument at line 64, manually re-implementi…

Remote | Information Disclosure
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
5.3 MEDIUM
CVE-2026-40152 — PraisonAIAgents has a Path Traversal via Unvalidated Glob Pattern in list_files Bypasses …

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the …

Remote | Path Traversal
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
5.3 MEDIUM
CVE-2026-40151 — PraisonAI Affected by Unauthenticated Information Disclosure of Agent Instructions via /a…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the AgentOS deployment platform exposes a GET /api/agents endpoint that returns agent names, roles, and the first 100 characters of agent sy…

praisonai | Remote | Information Disclosure
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
7.7 HIGH
CVE-2026-40150 — PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl() function in praisonaiagents/tools/web_crawl_tools.py accepts arbitrary URLs from AI agents with zero validation. No sc…

Remote | Server-Side Request Forgery
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
7.9 HIGH
CVE-2026-40149 — PraisonAI has an Unauthenticated Allow-List Manipulation Bypasses Agent Tool Approval Saf…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/approval/allow-list endpoint permits unauthenticated modification of the tool approval allowlist when no auth_token is co…

praisonai | Authentication
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
6.5 MEDIUM
CVE-2026-40148 — PraisonAI Affected by Decompression Bomb DoS via Recipe Bundle Extraction Without Size Li…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the _safe_extractall() function in PraisonAI's recipe registry validates archive members against path traversal attacks but performs no chec…

praisonai | Remote | Path Traversal
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
6.2 MEDIUM
CVE-2026-40117 — PraisonAIAgents Affected by Arbitrary File Read via read_skill_file Missing Workspace Bou…

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, read_skill_file() in skill_tools.py allows reading arbitrary files from the filesystem by accepting an unrestricted skill_path paramet…

| Path Traversal
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
7.5 HIGH
CVE-2026-40116 — PraisonAI's Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Withou…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signatu…

praisonai | Remote | Authentication
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
6.2 MEDIUM
CVE-2026-40115 — PraisonAI has an Unrestricted Upload Size in WSGI Recipe Registry Server Enables Memory E…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the WSGI-based recipe registry server (server.py) reads the entire HTTP request body into memory based on the client-supplied Content-Length…

praisonai | Denial of Service
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
7.2 HIGH
CVE-2026-40114 — PraisonAI has Server-Side Request Forgery via Unvalidated webhook_url in Jobs API

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (succe…

praisonai | Remote | Server-Side Request Forgery
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
8.4 HIGH
CVE-2026-40113 — PraisonAI has an Argument Injection into Cloud Run Environment Variables via Unsanitized …

PraisonAI is a multi-agent teams system. Prior to 4.5.128, deploy.py constructs a single comma-delimited string for the gcloud run deploy --set-env-vars argument by directly interpolating openai_mode…

praisonai | Misconfiguration
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
5.4 MEDIUM
CVE-2026-40112 — PraisonAI has Stored XSS via Unsanitized Agent Output in HTML Rendering (nh3 Not a Requir…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoint in src/praisonai/api.py renders agent output as HTML without effective sanitization. The _sanitize_html function reli…

praisonai | Remote | Cross-Site Scripting
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
9.3 CRITICAL
CVE-2026-40111 — PraisonAIAgents has an OS Command Injection via shell=True in Memory Hooks Executor (memo…

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he memory hooks executor in praisonaiagents passes a user-controlled command string directly to subprocess.run() with shell=True at sr…

| Injection
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
6.5 MEDIUM
CVE-2026-39848 — Dockyard's Unauthenticated Cron Endpoint in Dockyard Enables Container Enumeration and Da…

Dockyard is a Docker container management app. Prior to 1.1.0, Docker container start and stop operations are performed through GET requests without CSRF protection. A remote attacker can cause a log…

Remote | Cross-Site Request Forgery
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
4.8 MEDIUM
CVE-2026-35646 — OpenClaw < 2026.3.25 - Pre-Authentication Rate-Limit Bypass in Webhook Token Validation

OpenClaw before 2026.3.25 contains a pre-authentication rate-limit bypass vulnerability in webhook token validation that allows attackers to brute-force weak webhook secrets. The vulnerability exists…

openclaw | Remote | Authentication
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
8.1 HIGH
CVE-2026-35645 — OpenClaw < 2026.3.25 - Privilege Escalation via Synthetic operator.admin in deleteSession

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subagent fallback deleteSession function that uses a synthetic operator.admin runtime scope. Attackers ca…

openclaw | Remote | Authorization
Apr 09, 2026 Apr 09, 2026
Apr 09, 2026
Apr 09, 2026
Showing 20 of 6448 Results