CVE-2026-34938

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host. This issue has been patched in version 1.5.90.
Configurations

Configuration 1 (hide)

cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*

History

14 Apr 2026, 18:07

Type Values Removed Values Added
CPE cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-6vh2-h83c-9294 - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-6vh2-h83c-9294 - Exploit, Vendor Advisory
First Time Praison praisonaiagents
Praison

03 Apr 2026, 23:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-03 23:17

Updated : 2026-04-14 18:07


NVD link : CVE-2026-34938

Mitre link : CVE-2026-34938

CVE.ORG link : CVE-2026-34938


JSON object : View

Products Affected

praison

  • praisonaiagents
CWE
CWE-693

Protection Mechanism Failure