← Back to feed

PraisonAIAgents SSRF Vulnerability (CVE-2026-40160): Cloud Metadata Access via Malicious URL Crawling

Date: 2026-04-13
Tags: malicious-tool, supply-chain

Executive Summary

PraisonAIAgents before version 1.5.128 contains an SSRF vulnerability (CWE-918) in its web_crawl module. The httpx fallback path uses user-supplied URLs directly in asynchronous HTTP GET requests with automatic redirect following and no validation of the host. An LLM agent tricked into crawling an internal URL can reach cloud metadata endpoints (169.254.169.254), internal services, and localhost. The response content is returned to the agent and may appear in output visible to the attacker. This enables an attacker controlling an LLM agent to induce requests to internal IP addresses and services, including cloud metadata endpoints, potentially exposing sensitive internal data.

Campaign Summary

FieldDetail
Campaign / MalwareAI Agent SSRF Exploitation (CVE-2026-40160)
AttributionUnknown (confidence: low)
TargetOrganizations running PraisonAIAgents for multi-agent AI workflows
VectorServer-side request forgery via compromised or malicious LLM agent input to web_crawl function
Statusactive
First Observed2026-04-01

Detailed Findings

Prior to 1.5.128, web_crawl's httpx fallback path passes user-supplied URLs directly to httpx.AsyncClient.get() with follow_redirects=True and no host validation. An LLM agent tricked into crawling an internal URL can reach cloud metadata endpoints (169.254.169.254), internal services, and localhost. The response content is returned to the agent and may appear in output visible to the attacker. This fallback is the default crawl path on a fresh PraisonAI installation (no Tavily key, no Crawl4AI installed). The vulnerability is particularly dangerous in production environments where agents have autonomy to interpret user requests.

MITRE ATT&CK Mapping

TechniqueIDContext
Server-Side Request ForgeryT1918SSRF via web crawling function enables access to cloud metadata endpoints and internal services
Credentials from Cloud MetadataT1578Metadata endpoint access exposes IAM role credentials, temporary security tokens

IOCs

Domains

_No IOCs published; vulnerability patched in version 1.5.128_

Full URL Paths

_No IOCs published; vulnerability patched in version 1.5.128_

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

praisonaiagents

Detection Recommendations

Monitor PraisonAIAgents web_crawl requests for URLs targeting cloud metadata ranges (169.254.169.254/32), internal RFC1918 addresses (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), or localhost (127.0.0.1). Implement network segmentation preventing agent VMs/containers from reaching metadata endpoints. Require upgrade to version 1.5.128 or later immediately. Audit agent logs for requests to internal services or metadata endpoints; treat as indicators of agent compromise or malicious prompt injection.

References