PraisonAI GitHub Actions Vulnerable to Critical Token Leak

PraisonAI GitHub Actions Vulnerable to Critical Token Leak

The National Vulnerability Database (NVD) recently disclosed a critical vulnerability, CVE-2026-40313, impacting PraisonAI’s multi-agent teams system. Versions 4.5.139 and below are susceptible to what’s known as an ArtiPACKED attack, a nasty credential leakage vector stemming from improper use of actions/checkout in GitHub Actions workflows.

According to the NVD, the default behavior of actions/checkout writes GITHUB_TOKEN (and sometimes ACTIONS_RUNTIME_TOKEN) into the .git/config file. If subsequent workflow steps then upload artifacts, these tokens can easily be bundled along. Given PraisonAI is a public repository, any user with read access can download these artifacts and snatch those leaked tokens. This isn’t just a minor slip-up; it’s a direct path for attackers to push malicious code, poison releases, compromise PyPI/Docker packages, steal repository secrets, and ultimately execute a full-blown supply chain compromise. We’re talking about downstream users being affected by this. NVD noted that the issue permeated numerous workflow and action files across .github/workflows/ and .github/actions/. Thankfully, PraisonAI has patched this in version 4.5.140.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 5 SIEM formats

2 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

medium T1537 Initial Access

Data Exfiltration to Cloud Storage

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

2 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40313 Information Disclosure PraisonAI versions 4.5.139 and below
CVE-2026-40313 Misconfiguration GitHub Actions workflow using actions/checkout without persist-credentials: false
CVE-2026-40313 Credential Leakage GITHUB_TOKEN or ACTIONS_RUNTIME_TOKEN inadvertently included in uploaded artifacts from .git/config
CVE-2026-40313 Supply Chain Compromise Public PraisonAI repository allowing artifact download and token extraction

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs