HomePraisonCVE-2026-34937

CVE-2026-34937

HIGH
7.8CVSS
Published: 2026-04-03
Updated: 2026-04-14
AI Analysis

Description

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "<code>" and passing it to subprocess.run(..., shell=True). The escaping logic only handles \ and ", leaving $() and backtick substitutions unescaped, allowing arbitrary OS command execution before Python is invoked. This issue has been patched in version 1.5.90.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
local
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-78

Metadata

Primary Vendor
PRAISON
Published
4/3/2026
Last Modified
4/14/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

praison : praisonaiagents

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-34937 | HIGH Severity | CVEDatabase.com | CVEDatabase.com