top of page
perceptive_background_267k.jpg

PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentic…

Published:

7 april 2026 om 22:00:00

Alert date:

8 april 2026 om 22:09:50

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Identity & Access

PraisonAI multi-agent teams system contains an authentication bypass vulnerability in versions prior to 4.5.115. The A2U (Agent-to-User) event stream server exposes all agent activity without authentication checks. The create_a2u_routes() function registers multiple endpoints including /a2u/info, /a2u/subscribe, /a2u/events/{stream_name}, /a2u/events/sub/{id}, and /a2u/health without proper authentication. This allows unauthorized access to sensitive agent activity data. The vulnerability has been fixed in version 4.5.115.

Technical details

Mitigation steps:

Affected products:

PraisonAI

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page