CVE-2026-34953

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
Configurations

Configuration 1 (hide)

cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*

History

09 Apr 2026, 16:52

Type Values Removed Values Added
CPE cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-98f9-fqg5-hvq5 - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-98f9-fqg5-hvq5 - Exploit, Vendor Advisory
First Time Praison
Praison praisonai

06 Apr 2026, 17:17

Type Values Removed Values Added
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-98f9-fqg5-hvq5 - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-98f9-fqg5-hvq5 -

03 Apr 2026, 23:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-03 23:17

Updated : 2026-04-09 16:52


NVD link : CVE-2026-34953

Mitre link : CVE-2026-34953

CVE.ORG link : CVE-2026-34953


JSON object : View

Products Affected

praison

  • praisonai
CWE
CWE-863

Incorrect Authorization