Post

2026-05-10 Daily Vulns

NEW:

CVEvendor-productdescriptionmetricReferenceurltitleGithubURL 
CVE-2026-41496MervinPraison - PraisonAIPraisonAI is a multi-agent teams system. Prior to praisonai version 4.6.9 and praisonaiagents version 1.6.9, the fix for CVE-2026-40315 added input validation to SQLiteConversationStore only. Nine sibling backends — MySQL, PostgreSQL, async SQLite/MySQL/PostgreSQL, Turso, SingleStore, Supabase, SurrealDB — pass table_prefix straight into f-string SQL. Same root cause, same code pattern, same exploitation. 52 unvalidated injection points across the codebase. postgres.py additionally accepts an unvalidated schema parameter used directly in DDL. This issue has been patched in praisonai version 4.6.9 and praisonaiagents version 1.6.9.CVSS3.1: 8.1 - HIGH0Exploitation: pocAutomatable: noTechnical Impact: totalPraisonAI: SQL Injection via unvalidated `table_prefix` in 9 conversation store backends (incomplete fix for CVE-2026-40315)github
CVE-2025-63703n/a - n/anpm package parse-ini v1.0.6 is vulnerable to Prototype Pollution in index.js().CNA n/a CVSS3.1: 9.8 - CRITICAL0 1Exploitation: noneAutomatable: yesTechnical Impact: totalundefinedgithub
CVE-2024-33724n/a - n/aSOPlanning 1.52.00 is vulnerable to Cross Site Scripting (XSS) via the groupe_id parameter to process/groupe_save.php.CNA n/a CVSS3.1: 5.4 - MEDIUM0Exploitation: pocAutomatable: noTechnical Impact: partialundefinedgithub
This post is licensed under CC BY 4.0 by the author.