CVE-2026-34937

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "<code>" and passing it to subprocess.run(..., shell=True). The escaping logic only handles \ and ", leaving $() and backtick substitutions unescaped, allowing arbitrary OS command execution before Python is invoked. This issue has been patched in version 1.5.90.
Configurations

Configuration 1 (hide)

cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*

History

14 Apr 2026, 18:09

Type Values Removed Values Added
First Time Praison praisonaiagents
Praison
CPE cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-w37c-qqfp-c67f - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-w37c-qqfp-c67f - Exploit, Vendor Advisory

06 Apr 2026, 17:17

Type Values Removed Values Added
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-w37c-qqfp-c67f - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-w37c-qqfp-c67f -

03 Apr 2026, 23:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-03 23:17

Updated : 2026-04-14 18:09


NVD link : CVE-2026-34937

Mitre link : CVE-2026-34937

CVE.ORG link : CVE-2026-34937


JSON object : View

Products Affected

praison

  • praisonaiagents
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')