Code Execution Vulnerability in PraisonAI by Mervin Praison
CVE-2026-39888

10CRITICAL

Key Information:

Vendor
CVE Published:
8 April 2026

What is CVE-2026-39888?

PraisonAI, a multi-agent system, has a vulnerability that allows user code execution to bypass security measures in versions prior to 1.5.115. The execute_code() function in praisonaiagents.tools.python_tools defaults to sandbox_mode="sandbox", restricting user code execution within a controlled environment. However, the embedded blocklist for restricted attributes fails to cover key elements that allow frame traversal, such as traceback, tb_frame, f_back, and f_builtins. This oversight permits an attacker to access the real Python builtins dictionary and execute arbitrary code, undermining the sandbox's intended protections. The issue is addressed in version 1.5.115.

Affected Version(s)

praisonaiagents < 1.5.115

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.