


Perceptive Security
SOC/SIEM Consultancy

PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentic…
Published:
7 April 2026 at 22:00:00
Alert date:
8 April 2026 at 22:09:50
Source:
nvd.nist.gov
Web Technologies, Identity & Access
PraisonAI multi-agent teams system contains an authentication bypass vulnerability in versions prior to 4.5.115. The A2U (Agent-to-User) event stream server exposes all agent activity without authentication checks. The create_a2u_routes() function registers multiple endpoints including /a2u/info, /a2u/subscribe, /a2u/events/{stream_name}, /a2u/events/sub/{id}, and /a2u/health without proper authentication. This allows unauthorized access to sensitive agent activity data. The vulnerability has been fixed in version 4.5.115.
Technical details
Mitigation steps:
Affected products:
PraisonAI
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-39889
https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-f292-66h9-fpmf
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
