Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
9.1

PraisonAI Browser Bridge: Unauthorized Remote Session Hijacking

CVE-2026-40289
Summary

PraisonAI's browser bridge has a security flaw that allows an attacker to take control of a user's browser session without a password. This can lead to unauthorized access to sensitive information and automated actions in connected browser sessions. Update to PraisonAI version 4.5.139 and praisonaiagents version 1.5.140 to fix this issue.

Original title
PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote ...
Original description
PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on its /ws WebSocket endpoint. The server binds to 0.0.0.0 by default and only validates the Origin header when one is present, meaning any non-browser client that omits the header is accepted without restriction. An unauthenticated network attacker can connect, send a start_session message, and the server will route it to the first idle browser-extension WebSocket (effectively hijacking that session) and then broadcast all resulting automation actions and outputs back to the attacker. This enables unauthorized remote control of connected browser automation sessions, leakage of sensitive page context and automation results, and misuse of model-backed browser actions in any environment where the bridge is network-reachable. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents.
nvd CVSS3.1 9.1
Vulnerability type
CWE-306 Missing Authentication for Critical Function
Published: 14 Apr 2026 · Updated: 14 Apr 2026 · First seen: 14 Apr 2026