Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
9.1

PraisonAI: GitHub credentials leaked in version 4.5.139 and below

CVE-2026-40313
Summary

PraisonAI versions 4.5.139 and below leak GitHub credentials, which can be used by attackers to push malicious code, steal secrets, and compromise users. To fix this, update to version 4.5.140. If an update is not possible, review and modify your GitHub Actions workflows to prevent credential leakage.

Original title
PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/c...
Original description
PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false. By default, actions/checkout writes the GITHUB_TOKEN (and sometimes ACTIONS_RUNTIME_TOKEN) into the .git/config file for persistence, and if any subsequent workflow step uploads artifacts (build outputs, logs, test results, etc.), these tokens can be inadvertently included. Since PraisonAI is a public repository, any user with read access can download these artifacts and extract the leaked tokens, potentially enabling an attacker to push malicious code, poison releases and PyPI/Docker packages, steal repository secrets, and execute a full supply chain compromise affecting all downstream users. The issue spans numerous workflow and action files across .github/workflows/ and .github/actions/. This issue has been fixed in version 4.5.140.
nvd CVSS3.1 9.1
Vulnerability type
CWE-829
Published: 14 Apr 2026 · Updated: 14 Apr 2026 · First seen: 14 Apr 2026