PraisonAI Browser Bridge Critical Session Hijacking
The National Vulnerability Database (NVD) has issued a critical advisory for PraisonAI and praisonaiagents, multi-agent systems that leverage browser automation. Designated CVE-2026-40289, this vulnerability allows for unauthenticated remote session hijacking within the browser bridge, specifically affecting versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents. The core issue lies in a missing authentication mechanism and a bypassable origin check on the /ws WebSocket endpoint.
According to the NVD, the server, which binds to 0.0.0.0 by default, only validates the Origin header when it’s present. This oversight means any non-browser client can connect without restriction by simply omitting the header. An unauthenticated network attacker can then send a start_session message, effectively hijacking the first idle browser-extension WebSocket. This grants them unauthorized remote control over connected browser automation sessions, enabling data exfiltration of sensitive page context and automation results, and potential misuse of model-backed browser actions from any network-reachable bridge. This is a severe oversight, categorized under CWE-306 (Missing Authentication for Critical Function), and has been patched in the specified updated versions.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 5 SIEM formats5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-40289
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40289 | Auth Bypass | PraisonAI versions below 4.5.139 |
| CVE-2026-40289 | Auth Bypass | praisonaiagents versions below 1.5.140 |
| CVE-2026-40289 | Remote Session Hijacking | PraisonAI browser bridge (praisonai browser start) missing authentication |
| CVE-2026-40289 | Remote Session Hijacking | PraisonAI browser bridge /ws WebSocket endpoint bypassable origin check |
| CVE-2026-40289 | Remote Session Hijacking | PraisonAI browser bridge binds to 0.0.0.0 by default, accepts connections without Origin header |