Arbitrary OS Command Execution Vulnerability in PraisonAI by Mervin Praison
CVE-2026-34938

10CRITICAL

Key Information:

Status
Vendor
CVE Published:
3 April 2026

What is CVE-2026-34938?

PraisonAI, a multi-agent teams system, contains a vulnerability where the execute_code() function in its agent framework allows for execution of attacker-controlled Python code. This flaw exists due to a bypass in the three-layer sandbox protection mechanism, which can be exploited by an attacker passing a string subclass with an overridden startswith() method to the _safe_getattr wrapper. As a result, it can lead to arbitrary OS command execution on the host system. This vulnerability has been addressed in versions 1.5.90 and later.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

PraisonAI < 1.5.90

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.