HomePraisonCVE-2026-34938

CVE-2026-34938

CRITICAL
10.0CVSS
Published: 2026-04-03
Updated: 2026-04-14
AI Analysis

Description

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host. This issue has been patched in version 1.5.90.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-693

Metadata

Primary Vendor
PRAISON
Published
4/3/2026
Last Modified
4/14/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

praison : praisonaiagents

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-34938 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com