LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-40313

CVE-2026-40313 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: April 14, 2026

PraisonAI - Authentication Bypass

Published: April 14, 2026Updated: April 14, 2026Remote Exploitable

Overview

PraisonAI <= 4.5.139 contains a credential leakage vulnerability caused by actions/checkout persisting GITHUB_TOKEN in .git/config, letting attackers with read access leak tokens via artifacts, enabling supply chain compromise, exploit requires public repository with artifact upload.

Severity & Score

Severity: Critical
CVSS Score: 9.1
EPSS Score: 0.0%(Probability of exploitation in next 30 days)

Impact

Attackers can steal tokens to push malicious code, poison releases, and execute full supply chain compromise.

Mitigation

Upgrade to version 4.5.140 or later.

Social Media Activity(4 posts)

OffSequence
OffSequence
@offseq
Apr 14, 2026

🚩 CRITICAL CVE-2026-40313: PraisonAI ≤ 4.5.139 exposes GITHUB_TOKEN in workflow artifacts. Attackers can push malicious code & steal secrets. Upgrade to 4.5.140+ & set persist-credentials: false. https://radar.offseq.com/threat/cve-2026-40313-cwe-829-inclusion-of-functionality--2d33a73b #OffSeq #SupplyChain #CVE202640313

View original post
TheHackerWire
TheHackerWire
@thehackerwire
Apr 14, 2026

šŸ”“ CVE-2026-40313 - Critical (9.1) PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-40313/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post
OffSequence
OffSequence
@offseq
Apr 14, 2026

🚩 CRITICAL CVE-2026-40313: PraisonAI ≤ 4.5.139 exposes GITHUB_TOKEN in workflow artifacts. Attackers can push malicious code & steal secrets. Upgrade to 4.5.140+ & set persist-credentials: false. https://radar.offseq.com/threat/cve-2026-40313-cwe-829-inclusion-of-functionality--2d33a73b #OffSeq #SupplyChain #CVE202640313

View original post
TheHackerWire
TheHackerWire
@thehackerwire
Apr 14, 2026

šŸ”“ CVE-2026-40313 - Critical (9.1) PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-40313/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-40313
Severity
Critical
CVSS Score
9.1
Type
broken_authentication
Status
new
EPSS
0.0%
Social Posts
4

CWE

  • CWE-829

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS Score

0.0%Probability of exploitation in the next 30 days