CWE-396

Declaration of Catch for Generic Exception

2 CVEs Avg CVSS 6.9 MITRE
0
CRITICAL
1
HIGH
1
MEDIUM
0
LOW
1
POC
0
KEV

Monthly

CVE-2026-40149 HIGH PATCH GHSA This Week

Unauthenticated modification of the tool approval allowlist in PraisonAI multi-agent system (versions prior to 4.5.128) enables attackers to bypass human-in-the-loop safety controls by injecting dangerous tool names (shell_exec, file_write) into the allowlist via the /api/approval/allow-list gateway endpoint. The ExecApprovalManager then auto-approves agent invocations of these tools, circumventing the approval mechanism's core security function. Attack requires local access; no public exploit identified at time of analysis. CVSS 7.9 reflects high integrity impact with scope change due to compromised safety boundaries in agent workflows.

Authentication Bypass Praisonai
NVD GitHub
CVSS 3.1
7.9
EPSS
0.0%
CVE-2026-27482 MEDIUM POC PATCH This Month

Ray dashboard versions 2.53.0 and below lack proper authentication on DELETE endpoints, allowing unauthenticated attackers to terminate Serve instances or remove jobs through DNS rebinding or same-network attacks. Public exploit code exists for this vulnerability, which impacts Ray deployments with dashboards exposed to network access. Administrators should upgrade to Ray 2.54.0 or higher to remediate the availability risk.

Dns AI / ML Ray
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-40149
EPSS 0% CVSS 7.9
HIGH PATCH This Week

Unauthenticated modification of the tool approval allowlist in PraisonAI multi-agent system (versions prior to 4.5.128) enables attackers to bypass human-in-the-loop safety controls by injecting dangerous tool names (shell_exec, file_write) into the allowlist via the /api/approval/allow-list gateway endpoint. The ExecApprovalManager then auto-approves agent invocations of these tools, circumventing the approval mechanism's core security function. Attack requires local access; no public exploit identified at time of analysis. CVSS 7.9 reflects high integrity impact with scope change due to compromised safety boundaries in agent workflows.

Authentication Bypass Praisonai
NVD GitHub
CVE-2026-27482
EPSS 0% CVSS 5.9
MEDIUM POC PATCH This Month

Ray dashboard versions 2.53.0 and below lack proper authentication on DELETE endpoints, allowing unauthenticated attackers to terminate Serve instances or remove jobs through DNS rebinding or same-network attacks. Public exploit code exists for this vulnerability, which impacts Ray deployments with dashboards exposed to network access. Administrators should upgrade to Ray 2.54.0 or higher to remediate the availability risk.

Dns AI / ML Ray
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy