10
CVE-2026-34938
- EPSS 0.13%
- Veröffentlicht 03.04.2026 23:17:06
- Zuletzt bearbeitet 14.04.2026 18:07:19
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host. This issue has been patched in version 1.5.90.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Praison ≫ Praisonaiagents Version < 1.5.90
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.13% | 0.327 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-advisories@github.com | 10 | 3.9 | 6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
CWE-693 Protection Mechanism Failure
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.